-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19965 / XSA-279
version 3
x86: DoS from attempting to use INVPCID with a non-canonical addresses
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19964 / XSA-277
version 3
x86: incorrect error handling for guest p2m page removals
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19966 / XSA-280
version 3
Fix for XSA-240 conflicts with shadow paging
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19961,CVE-2018-19962 / XSA-275
version 3
insufficient TLB flushing / improper large page mappings with AMD IOMMUs
UPDATES IN VERSION 3
CVEs assigned.
ISSUE DE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-19963 / XSA-276
version 3
resource accounting issues in x86 IOREQ server handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-280
version 2
Fix for XSA-240 conflicts with shadow paging
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-279
version 2
x86: DoS from attempting to use INVPCID with a non-canonical addresses
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-275
version 2
insufficient TLB flushing / improper large page mappings with AMD IOMMUs
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-277
version 2
x86: incorrect error handling for guest p2m page removals
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-276
version 2
resource accounting issues in x86 IOREQ server handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-282
guest use of HLE constructs may lock up host
ISSUE DESCRIPTION
=
Various Intel CPU models have an erratum listed under the title
"Processor May Hang When Executing Code
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-18883 / XSA-278
version 2
x86: Nested VT-x usable even when disabled
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-278
x86: Nested VT-x usable even when disabled
ISSUE DESCRIPTION
=
When running HVM guests, virtual extensions are enabled in hardware because
Xen is using them. As a re
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15471 / XSA-270
version 3
Linux netback driver OOB access in hash handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15470 / XSA-272
version 3
oxenstored does not apply quota-maxentity
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15468 / XSA-269
version 3
x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-15469 / XSA-268
version 3
Use of v2 grant tables may cause crash on ARM
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14678 / XSA-274
version 3
Linux: Uninitialized state in x86 PV failsafe callback path
UPDATES IN VERSION 3
Fix spelling in CREDITS.
ISSUE DESCRIP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-272
version 2
oxenstored does not apply quota-maxentity
UPDATES IN VERSION 2
Ammend patch to reference XSA-272 in the commit message.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14007 / XSA-271
version 2
XAPI HTTP directory traversal
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-268
version 2
Use of v2 grant tables may cause crash on ARM
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
AR
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-269
version 2
x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-270
version 2
Linux netback driver OOB access in hash handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
L
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-3620,CVE-2018-3646 / XSA-273
L1 Terminal Fault speculative side channel
ISSUE DESCRIPTION
=
In x86 nomenclature, a Terminal Fault is a pagetable walk which aborts
due to the page b
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14678 / XSA-274
version 2
Linux: Uninitialized state in x86 PV failsafe callback path
UPDATES IN VERSION 2
CVE assigned. Fix the title to refer to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-274
Linux: Uninitialized state in PV syscall return path
ISSUE DESCRIPTION
=
Linux has a `failsafe` callback, invoked by Xen under certain
conditions. Normally in this failsaf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12892 / XSA-266
version 3
libxl fails to honour readonly flag on HVM emulated SCSI disks
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12891 / XSA-264
version 3
preemption checks bypassed in x86 PV MM handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-12893 / XSA-265
version 3
x86: #DB exception safety check can be triggered by a guest
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-3665 / XSA-267
version 3
Speculative register leakage from lazy FPU context switching
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10981 / XSA-262
version 3
qemu may drive Xen into unbounded loop
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10982 / XSA-261
version 3
x86 vHPET interrupt injection errors
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-8897 / XSA-260
version 2
x86: mishandling of debug exceptions
UPDATES IN VERSION 2
Public release.
Updated .meta file
ISSUE DESCRIPTIO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-262
version 2
qemu may drive Xen into unbounded loop
UPDATES IN VERSION 2
Public release.
Updated .meta file
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-261
version 2
x86 vHPET interrupt injection errors
UPDATES IN VERSION 2
Versions 3.1 ... 3.3 don't appear to be vulnerable.
Public r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10471 / XSA-259
version 3
x86: PV guest may crash Xen with XPTI
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-10472 / XSA-258
version 3
Information leak via crafted user-supplied CDROM
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-259
version 2
x86: PV guest may crash Xen with XPTI
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
The wo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-258
version 2
Information leak via crafted user-supplied CDROM
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Q
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-7542 / XSA-256
version 3
x86 PVH guest without LAPIC may DoS the host
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-7541 / XSA-255
version 4
grant table v2 -> v1 transition may crash Xen
UPDATES IN VERSION 4
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-7540 / XSA-252
version 3
DoS via non-preemptable L3/L4 pagetable freeing
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-255
version 3
grant table v2 -> v1 transition may crash Xen
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
Gr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-252
version 2
DoS via non-preemptable L3/L4 pagetable freeing
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-256
version 2
x86 PVH guest without LAPIC may DoS the host
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
So
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 12
Information leak via side effects of speculative execution
UPDATES IN VERSION 12
=
Corrections to AR
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 11
Information leak via side effects of speculative execution
UPDATES IN VERSION 11
=
Information provi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 10
Information leak via side effects of speculative execution
UPDATES IN VERSION 10
=
Provided summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 9
Information leak via side effects of speculative execution
UPDATES IN VERSION 9
"Stage 1" pagetable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 8
Information leak via side effects of speculative execution
UPDATES IN VERSION 8
PVH shim ("Comet") i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 7
Information leak via side effects of speculative execution
UPDATES IN VERSION 7
PVH shim ("Comet") f
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 6
Information leak via side effects of speculative execution
UPDATES IN VERSION 6
PVH shim ("Comet") f
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 5
Information leak via side effects of speculative execution
UPDATES IN VERSION 5
PV-in-PVH/HVM shim a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 4
Information leak via side effects of speculative execution
UPDATES IN VERSION 4
Added README for det
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17563 / XSA-249
version 3
broken x86 shadow mode refcount overflow check
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17564 / XSA-250
version 3
improper x86 shadow mode refcount error handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17566 / XSA-248
version 3
x86 PV guests may gain access to internally used pages
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17565 / XSA-251
version 3
improper bug check in x86 log-dirty handling
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-5244 / XSA-253
version 3
x86: memory leak with MSR emulation
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254
version 3
Information leak via side effects of speculative execution
UPDATES IN VERSION 3
Add information abou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-253
version 2
x86: memory leak with MSR emulation
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
In Xen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-254
Information leak via side effects of speculative execution
ISSUE DESCRIPTION
=
Processors give the illusion of a sequence of instructions executed
one-by-one. However, in o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-251
version 2
improper bug check in x86 log-dirty handling
UPDATES IN VERSION 2
Public release.
Provide information for Xen 4.10-in-prep
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-250
version 2
improper x86 shadow mode refcount error handling
UPDATES IN VERSION 2
Public release.
Provide metadata file.
ISSUE DESCRIPT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-248
version 2
x86 PV guests may gain access to internally used pages
UPDATES IN VERSION 2
Public release.
Provide metadata file.
ISSUE DESC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-249
version 2
broken x86 shadow mode refcount overflow check
UPDATES IN VERSION 2
Public release.
Provide metadata file.
ISSUE DESCRIPTI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15591 / XSA-238
version 3
DMOP map/unmap missing argument checks
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17045 / XSA-247
version 3
Missing p2m error checking in PoD code
UPDATES IN VERSION 3
CVE assigned.
Fixed "Reported-by" tags in patch c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17044 / XSA-246
version 3
x86: infinite loop due to missing PoD error checking
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-17046 / XSA-245
version 2
ARM: Some memory not scrubbed at boot
UPDATES IN VERSION 2
CVE assigned.
NOTE REGARDING LACK OF EMBARGO
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-247
version 2
Missing p2m error checking in PoD code
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Certa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-246
version 2
x86: infinite loop due to missing PoD error checking
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
201 - 272 of 272 matches
Mail list logo