-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2024-31143 / XSA-458
version 2
double unlock in x86 guest IRQ handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2024-31144 / XSA-459
version 2
Xapi: Metadata injection attack against backup/restore functionality
UPDATES IN VERSION 2
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2024-27393 / XSA-457
version 3
Linux/xen-netfront: Memory leak due to missing cleanup function
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-457
version 2
Linux/xen-netfront: Memory leak due to missing cleanup function
UPDATES IN VERSION 2
* Clarify the XSA is in netfront and *not*
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-457
Linux/xen-netback: Memory leak due to missing cleanup function
ISSUE DESCRIPTION
=
In netback, xennet_alloc_one_rx_buffer() failed to call the
appropriate clean-up function,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2024-2201 / XSA-456
version 3
x86: Native Branch History Injection
UPDATES IN VERSION 3
Issues were found with the original code changes.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2024-2201 / XSA-456
version 2
x86: Native Branch History Injection
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2024-31142 / XSA-455
version 4
x86: Incorrect logic for BTC/SRSO mitigations
UPDATES IN VERSION 4
Public release.
Correct references to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46842 / XSA-454
version 2
x86 HVM hypercalls may trigger Xen bug check
UPDATES IN VERSION 2
Avoid new Misra violation in 1st staging
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46841 / XSA-451
version 2
x86: shadow stack vs exceptions from emulation stubs
UPDATES IN VERSION 2
Largely cosmetic adjustment in patches.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46839 / XSA-449
version 2
pci: phantom functions assigned to incorrect contexts
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46840 / XSA-450
version 2
VT-d: Failure to quarantine devices in !HVM builds
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46838 / XSA-448
version 2
Linux: netback processing of zero-length transmit fragment
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46837 / XSA-447
version 2
arm32: The cache may not be properly cleaned/invalidated (take two)
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46836 / XSA-446
version 2
x86: BTC/SRSO fixes not fully effective
UPDATES IN VERSION 2
Grammar fixes.
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-46835 / XSA-445
version 3
x86/AMD: mismatch in IOMMU quarantine page table levels
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34327,CVE-2023-34328 / XSA-444
version 3
x86/AMD: Debug Mask handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34326 / XSA-442
version 2
x86/AMD: missing IOMMU TLB flushing
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34323 / XSA-440
version 3
xenstored: A transaction conflict can crash C Xenstored
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34324 / XSA-441
version 4
Possible deadlock in Linux kernel event handling
UPDATES IN VERSION 4
Public release.
Modified advisory again to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-20588 / XSA-439
version 2
x86/AMD: Divide speculative information leak
UPDATES IN VERSION 2
Version 1 accidentally linked to the wrong AMD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-20588 / XSA-439
x86/AMD: Divide speculative information leak
ISSUE DESCRIPTION
=
In the Zen1 microarchitecure, there is one divider in the pipeline which
services uops from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34322 / XSA-438
version 2
top-level shadow reference dropped too early for 64-bit PV guests
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34321 / XSA-437
version 2
arm32: The cache may not be properly cleaned/invalidated
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-20569 / XSA-434
x86/AMD: Speculative Return Stack Overflow
ISSUE DESCRIPTION
=
Researchers from ETH Zurich have extended their prior research (XSA-422,
Branch Type
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-40982 / XSA-435
x86/Intel: Gather Data Sampling
ISSUE DESCRIPTION
=
A researcher has discovered Gather Data Sampling, a transient execution
side-channel whereby the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34319 / XSA-432
version 2
Linux: buffer overrun in netback due to unusual packet
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-34320 / XSA-436
arm: Guests can trigger a deadlock on Cortex-A77
ISSUE DESCRIPTION
=
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412
where software, under
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-20593 / XSA-433
version 3
x86/AMD: Zenbleed
UPDATES IN VERSION 3
The patch provided with earlier versions was buggy. It
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2023-20593 / XSA-433
version 2
x86/AMD: Zenbleed
UPDATES IN VERSION 2
Include the CVE, which was missed accidentally in the rush of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-433
x86/AMD: Zenbleed
ISSUE DESCRIPTION
=
Researchers at Google have discovered Zenbleed, a hardware bug causing
corruption of the vector registers.
When a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Notice 1
winpvdrvbuild.xenproject.org potentially compromised
ISSUE DESCRIPTION
=
Software running on the Xen Project hosted subdomain
winpvdrvbuild.xenproject.org is outdated and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42336 / XSA-431
Mishandling of guest SSBD selection on AMD hardware
ISSUE DESCRIPTION
=
The current logic to set SSBD on AMD Family 17h and Hygon Family 18h
processors requires
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42335 / XSA-430
version 2
x86 shadow paging arbitrary pointer dereference
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42331 / XSA-429
version 3
x86: speculative vulnerability in 32bit SYSCALL path
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42332 / XSA-427
version 2
x86 shadow plus log-dirty mode use-after-free
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42333,CVE-2022-42334 / XSA-428
version 3
x86/HVM pinned cache attributes mis-handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-27672 / XSA-426
version 2
x86: Cross-Thread Return Address Predictions
UPDATES IN VERSION 2
Xen 4.16 is vulnerable too. The previous
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-27672 / XSA-426
x86: Cross-Thread Return Address Predictions
ISSUE DESCRIPTION
=
It has been discovered that on some AMD CPUs, the RAS (Return Address
Stack, also called RAP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42330 / XSA-425
Guests can cause Xenstore crash via soft reset
ISSUE DESCRIPTION
=
When a guest issues a "Soft Reset" (e.g. for performing a kexec) the
libxl based Xen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-3643 / XSA-423
version 2
Guests can trigger NIC interface reset/abort/crash via netback
UPDATES IN VERSION 2
Patch updated.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-3643 / XSA-423
Guests can trigger NIC interface reset/abort/crash via netback
ISSUE DESCRIPTION
=
It is possible for a guest to trigger a NIC interface reset/abort/crash in
a Linux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42328,CVE-2022-42329 / XSA-424
Guests can trigger deadlock in Linux netback driver
ISSUE DESCRIPTION
=
The patch for XSA-392 introduced another issue which might result in
a deadlock
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-23824 / XSA-422
version 2
x86: Multiple speculative security issues
UPDATES IN VERSION 2
Change the URL referenced for the Branch Type
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-23824 / XSA-422
x86: Multiple speculative security issues
ISSUE DESCRIPTION
=
1) Researchers have discovered that on some AMD CPUs, the implementation
of IBPB (Indirect
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42325,CVE-2022-42326 / XSA-421
version 2
Xenstore: Guests can create arbitrary number of nodes via transactions
UPDATES IN VERSION 2
Fix typo in title.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42324 / XSA-420
version 2
Oxenstored 32->31 bit integer truncation issues
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42322,CVE-2022-42323 / XSA-419
version 2
Xenstore: Cooperating guests can create arbitrary numbers of nodes
UPDATES IN VERSION 2
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42327 / XSA-412
version 2
x86: unintended memory sharing between guests
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42310 / XSA-415
version 2
Xenstore: Guests can create orphaned Xenstore nodes
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42309 / XSA-414
version 2
Xenstore: Guests can crash xenstored
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-42320 / XSA-417
version 2
Xenstore: Guests can get access to Xenstore nodes of deleted domains
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-33749 / XSA-413
version 2
XAPI open file limit DoS
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
It
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-33748 / XSA-411
version 3
lock order inversion in transitive grant copy handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-33745 / XSA-408
version 3
insufficient TLB flush for x86 PV guests in shadow mode
UPDATES IN VERSION 3
Update hash for metadata file.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-33745 / XSA-408
version 2
insufficient TLB flush for x86 PV guests in shadow mode
UPDATES IN VERSION 2
Added metadata
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-33743 / XSA-405
version 3
network backend may cause Linux netfront to use freed SKBs
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory
CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742 / XSA-403
version 3
Linux disk/nic frontends data leaks
UPDATES IN VERSION 3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-33744 / XSA-406
version 3
Arm guests can cause Dom0 DoS via PV devices
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-21123,CVE-2022-21124,CVE-2022-21166 / XSA-404
x86: MMIO Stale Data vulnerabilities
ISSUE DESCRIPTION
=
This issue is related to the SRBDS, TAA and MDS vulnerabilities. Please
see:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-26362 / XSA-401
version 2
x86 pv: Race condition in typeref acquisition
UPDATES IN VERSION 2
Update 4.16 and 4.15 baselines.
Public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-26357 / XSA-399
version 2
race in VT-d domain ID cleanup
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-26356 / XSA-397
version 2
Racy interactions between dirty vram tracking and paging log dirty hypercalls
UPDATES IN VERSION 2
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory
CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042
/ XSA-396
version 3
Linux PV device frontends
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-23035 / XSA-395
version 2
Insufficient cleanup of passed-through device IRQs
UPDATES IN VERSION 2
Adjust patch subject.
Public release.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-23034 / XSA-394
version 3
A PV guest could DoS Xen while unmapping a grant
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2022-23033 / XSA-393
version 2
arm: guest_physmap_remove_page not removing the p2m mappings
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-376
frontends vulnerable to backends
ISSUE DESCRIPTION
=
Xen offers the ability to run PV backends in regular unprivileged
guests, typically referred to as "driver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28714,CVE-2021-28715 / XSA-392
version 4
Guest can force Linux netback driver to hog large amounts of kernel memory
UPDATES IN VERSION 4
Public release
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28711,CVE-2021-28712,CVE-2021-28713 / XSA-391
version 3
Rogue backends can cause DoS of guests via high frequency events
UPDATES IN VERSION 3
Public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28704,CVE-2021-28707,CVE-2021-28708 / XSA-388
version 3
PoD operations on misaligned GFNs
UPDATES IN VERSION 3
Correct affected versions
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28706 / XSA-385
version 2
guests may exceed their designated memory limit
UPDATES IN VERSION 2
Add CVE numbers to patches.
Public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28703 / XSA-387
version 2
grant table v2 status pages may remain accessible after de-allocation (take
two)
UPDATES IN VERSION 2
Public release.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28705,CVE-2021-28709 / XSA-389
version 3
issues with partially successful P2M updates on x86
UPDATES IN VERSION 3
Add CVE numbers to patches.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28710 / XSA-390
certain VT-d IOMMUs may not work in shared page table mode
ISSUE DESCRIPTION
=
For efficiency reasons, address translation control structures (page
tables) may (and,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28702 / XSA-386
version 2
PCI devices with RMRRs not deassigned correctly
UPDATES IN VERSION 2
Updated/corrected information about
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28702 / XSA-386
PCI devices with RMRRs not deassigned correctly
ISSUE DESCRIPTION
=
Certain PCI devices in a system might be assigned Reserved Memory
Regions (specified via
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28701 / XSA-384
version 3
Another race in XENMAPSPACE_grant_table handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28698 / XSA-380
version 3
long running loops in grant table handling
UPDATES IN VERSION 3
New bugfix patch on top of the prior set.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28698 / XSA-380
version 2
long running loops in grant table handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28700 / XSA-383
version 2
xen/arm: No memory limit for dom0less domUs
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28699 / XSA-382
version 2
inadequate grant-v2 status frames array bounds check
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28697 / XSA-379
version 2
grant table v2 status pages may remain accessible after de-allocation
UPDATES IN VERSION 2
Patches updated to fix a typo in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-0089,CVE-2021-26313 / XSA-375
version 4
Speculative Code Store Bypass
UPDATES IN VERSION 4
Correct the link to the AMD bulletin.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-0089,CVE-2021-26313 / XSA-375
version 3
Speculative Code Store Bypass
UPDATES IN VERSION 3
Added additional CVE, as Intel and AMD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28690 / XSA-377
version 2
x86: TSX Async Abort protections not restored after S3
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-0089 / XSA-375
version 2
Speculative Code Store Bypass
UPDATES IN VERSION 2
New 4.12 backport (also targeting 4.11), addressing a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28691 / XSA-374
version 2
Guest triggered use-after-free in Linux xen-netback
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28693 / XSA-372
version 3
xen/arm: Boot modules are not scrubbed
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28689 / XSA-370
version 2
x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests
UPDATES IN VERSION 2
Note that the patch is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28688 / XSA-371
version 3
Linux: blkback driver may leak persistent grants
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28687 / XSA-368
version 3
HVM soft-reset crashes toolstack
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-368
version 2
HVM soft-reset crashes toolstack
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
libxl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28039 / XSA-369
version 2
Linux: special config may crash when trying to map foreign pages
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28038 / XSA-367
version 2
Linux: netback fails to honor grant mapping errors
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-369
Linux: special config may crash when trying to map foreign pages
ISSUE DESCRIPTION
=
With CONFIG_XEN_BALLOON_MEMORY_HOTPLUG disabled and
CONFIG_XEN_UNPOPULATED_ALLOC enabled the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-367
Linux: netback fails to honor grant mapping errors
ISSUE DESCRIPTION
=
XSA-362 tried to address issues here, but in the case of the netback
driver the changes were
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-27379 / XSA-366
version 2
missed flush in XSA-321 backport
UPDATES IN VERSION 2
CVE assigned.
Fixed erroneous reference to XSA-320;
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-366
missed flush in XSA-321 backport
ISSUE DESCRIPTION
=
An oversight was made when backporting XSA-320, leading entries in the
IOMMU not being properly updated
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26931 / XSA-362
version 3
Linux: backends treating grant mapping errors as bugs
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
1 - 100 of 261 matches
Mail list logo