On Thu, Mar 07, 2019 at 04:27:34AM +, AJ Jordan wrote:
> If anyone wants to double-check that they haven't accidentally created
> a PV domain vulnerable to these XSAs, this command:
>
> % qvm-ls --fields NAME | tail -n +2 | xargs -n 1 -I % qvm-prefs % virt_mode |
> grep -ve pvh -e hvm | wc
If anyone wants to double-check that they haven't accidentally created
a PV domain vulnerable to these XSAs, this command:
% qvm-ls --fields NAME | tail -n +2 | xargs -n 1 -I % qvm-prefs % virt_mode |
grep -ve pvh -e hvm | wc -l
should do the trick. It reports how many vulnerable VMs are on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) #048: Multiple Xen
vulnerabilities. The text of this QSB is reproduced below. This QSB and
its accompanying signatures will always be available in the Qubes
Security Pack