Re: [qubes-users] QSB #048: Multiple Xen vulnerabilities

2019-03-08 Thread unman
On Thu, Mar 07, 2019 at 04:27:34AM +, AJ Jordan wrote: > If anyone wants to double-check that they haven't accidentally created > a PV domain vulnerable to these XSAs, this command: > > % qvm-ls --fields NAME | tail -n +2 | xargs -n 1 -I % qvm-prefs % virt_mode | > grep -ve pvh -e hvm | wc

Re: [qubes-users] QSB #048: Multiple Xen vulnerabilities

2019-03-07 Thread AJ Jordan
If anyone wants to double-check that they haven't accidentally created a PV domain vulnerable to these XSAs, this command: % qvm-ls --fields NAME | tail -n +2 | xargs -n 1 -I % qvm-prefs % virt_mode | grep -ve pvh -e hvm | wc -l should do the trick. It reports how many vulnerable VMs are on

[qubes-users] QSB #048: Multiple Xen vulnerabilities

2019-03-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, We have just published Qubes Security Bulletin (QSB) #048: Multiple Xen vulnerabilities. The text of this QSB is reproduced below. This QSB and its accompanying signatures will always be available in the Qubes Security Pack