-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3158,CVE-2016-3159 / XSA-172
version 3
broken AMD FPU FIP/FDP/FOP leak workaround
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3961 / XSA-174
version 3
hugetlbfs use may crash PV Linux guests
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3960 / XSA-173
version 3
x86 shadow pagetables: address width overflow
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3710,CVE-2016-3712 / XSA-179
version 4
QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
UPDATES IN VERSION 4
Public release. Also includ
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3710,CVE-2016-3712 / XSA-179
version 5
QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
UPDATES IN VERSION 5
Fixed credits section. Zuoz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-4480 / XSA-176
version 3
x86 software guest page walk PS bit handling flaw
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-215
version 2
possible memory corruption via failsafe callback
UPDATES IN VERSION 2
Public release.
Added email header syntax to patches,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-213
version 2
x86: 64bit PV guest breakout via pagetable use-after-mode-change
UPDATES IN VERSION 2
Public release.
Added email header syntax to p
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-214
version 2
grant transfer allows PV guest to elevate privileges
UPDATES IN VERSION 2
Public release.
Added email header syntax to patches
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-8904 / XSA-214
version 3
grant transfer allows PV guest to elevate privileges
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-8905 / XSA-215
version 3
possible memory corruption via failsafe callback
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-8903 / XSA-213
version 3
x86: 64bit PV guest breakout via pagetable use-after-mode-change
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12135 / XSA-226
version 6
multiple problems with transitive grants
UPDATES IN VERSION 6
Patches actually addressing the issue have become
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-235
add-to-physmap error paths fail to release lock on ARM
ISSUE DESCRIPTION
=
When dealing with the grant map space of add-to-physmap operations,
ARM specific code recognizes a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12135 / XSA-226
version 7
multiple problems with transitive grants
UPDATES IN VERSION 7
First patch provided in version 6 regressed 32-bi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-239
version 2
hypervisor stack leak in x86 I/O intercept code
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-241
version 3
Stale TLB entry due to page type release race
UPDATES IN VERSION 3
Fix ARM build issue in patches.
Public release.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-244
version 2
x86: Incorrect handling of IST settings during CPU hotplug
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-242
version 2
page type reference leak on x86
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
The page
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-243
version 3
x86: Incorrect handling of self-linear shadow mappings with translated guests
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-237
version 2
multiple MSI mapping issues on x86
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Multiple
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-238
version 2
DMOP map/unmap missing argument checks
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
DMOPs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15596 / XSA-235
version 2
add-to-physmap error paths fail to release lock on ARM
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15592 / XSA-243
version 4
x86: Incorrect handling of self-linear shadow mappings with translated guests
UPDATES IN VERSION 4
CVE assigned.
ISSUE DESCRI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15594 / XSA-244
version 3
x86: Incorrect handling of IST settings during CPU hotplug
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15590 / XSA-237
version 3
multiple MSI mapping issues on x86
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
M
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15593 / XSA-242
version 3
page type reference leak on x86
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
Th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15588 / XSA-241
version 4
Stale TLB entry due to page type release race
UPDATES IN VERSION 4
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15589 / XSA-239
version 3
hypervisor stack leak in x86 I/O intercept code
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15597 / XSA-236
version 3
pin count / page reference race in grant table code
UPDATES IN VERSION 3
We now once again think that only Xen 4.2 a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-15592 / XSA-243
version 5
x86: Incorrect handling of self-linear shadow mappings with translated guests
UPDATES IN VERSION 5
New final patch, addressin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12135 / XSA-226
version 5
multiple problems with transitive grants
UPDATES IN VERSION 5
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12134 / XSA-229
version 3
linux: Fix Xen block IO merge-ability calculation
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12136 / XSA-228
version 3
grant_table: Race conditions with maptrack free list handling
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12137 / XSA-227
version 3
x86: PV privilege escalation via map_grant_ref
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-230
version 2
grant_table: possibly premature clearing of GTF_writing / GTF_reading
UPDATES IN VERSION 2
Public release. (A CVE request for this iss
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-12855 / XSA-230
version 3
grant_table: possibly premature clearing of GTF_writing / GTF_reading
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-219
version 2
x86: insufficient reference counts during shadow emulation
UPDATES IN VERSION 2
Public release.
Add caveat about exploitability
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-222
version 2
stale P2M mappings due to insufficient error checking
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-220
version 2
x86: PKRU and BND* leakage between vCPU-s
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Memo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-221
version 2
NULL pointer deref in event channel poll
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
When
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-225
version 2
arm: vgic: Out-of-bound access when sending SGIs
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-217
version 2
page transfer may allow PV guest to elevate privilege
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-216
version 3
blkif responses leak backend stack data
UPDATES IN VERSION 3
Public release.
Fix a typo ("our" for "or" in Vulnerable S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-223
version 2
ARM guest disabling interrupt may crash Xen
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Vir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-218
version 4
Races in the grant table unmap code
UPDATES IN VERSION 4
Adjust last patch description and add review tag.
Public rele
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-216
version 4
blkif responses leak backend stack data
UPDATES IN VERSION 4
Move "For patch:" Reported-by to patches as intended.
ISSU
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10912 / XSA-217
version 3
page transfer may allow PV guest to elevate privilege
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10911 / XSA-216
version 5
blkif responses leak backend stack data
UPDATES IN VERSION 5
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10916 / XSA-220
version 3
x86: PKRU and BND* leakage between vCPU-s
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10923 / XSA-225
version 3
arm: vgic: Out-of-bound access when sending SGIs
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10919 / XSA-223
version 3
ARM guest disabling interrupt may crash Xen
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10915 / XSA-219
version 3
x86: insufficient reference counts during shadow emulation
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10917 / XSA-221
version 3
NULL pointer deref in event channel poll
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10918 / XSA-222
version 3
stale P2M mappings due to insufficient error checking
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-10913,CVE-2017-10914 / XSA-218
version 5
Races in the grant table unmap code
UPDATES IN VERSION 5
CVEs assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-14317 / XSA-233
version 3
cxenstored: Race in domain cleanup
UPDATES IN VERSION 3
Added metadata file
Public release.
ISSUE DESCRIPT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-14316 / XSA-231
version 3
Missing NUMA node parameter verification
UPDATES IN VERSION 3
Updated metadata file
Public release.
ISSUE DES
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-14318 / XSA-232
version 4
Missing check for grant table
UPDATES IN VERSION 4
Added metadata file
Public release.
ISSUE DESCRIPTIO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2017-14319 / XSA-234
version 3
insufficient grant unmapping checks for x86 PV guests
UPDATES IN VERSION 3
Added metadata file
Public release.
ISS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-245
ARM: Some memory not scrubbed at boot
NOTE REGARDING LACK OF EMBARGO
==
This bug was discussed publicly before it was realised that it was a
security vu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2017-7228 / XSA-212
version 3
x86: broken check in memory_exchange() permits PV guest breakout
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-7093 / XSA-186
version 4
x86: Mishandling of instruction pointer truncation during emulation
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-7092 / XSA-185
version 3
x86: Disallow L3 recursive pagetable for 32-bit PV guests
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-7154 / XSA-188
version 3
use after free in FIFO event channel code
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-7094 / XSA-187
version 3
x86 HVM: Overflow of sh_ctxt->seg_reg[]
UPDATES IN VERSION 3
Fix the backports xsa187-4.6-0002-*.patch and xsa187-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2017-2615 / XSA-208
oob access in cirrus bitblt copy
ISSUE DESCRIPTION
=
When doing bitblt copy backwards, qemu should negate the blit width.
This avoids an oob access before t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2017-2615 / XSA-208
version 2
oob access in cirrus bitblt copy
UPDATES IN VERSION 2
Included backport for qemu-xen versions 4.7 (and earlier)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-207
version 2
memory leak when destroying guest without PT devices
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
C
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2017-2620 / XSA-209
version 3
cirrus_bitblt_cputovideo does not check if memory region is safe
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2017-2620 / XSA-209
version 4
cirrus_bitblt_cputovideo does not check if memory region is safe
UPDATES IN VERSION 4
Include a prerequisite patch for qemu-ups
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-210
arm: memory corruption when freeing p2m pages
ISSUE DESCRIPTION
=
When freeing pages used for stage-2 page tables, the freeing routine
failed to remove these pages from a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9385 / XSA-193
version 3
x86 segment base write emulation lacking canonical address checks
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9382 / XSA-192
version 3
x86 task switch to VM86 mode mis-handled
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9384 / XSA-194
version 3
guest 32-bit ELF symbol table load leaking host data
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9386 / XSA-191
version 3
x86 null segments not always treated as unusable
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9379,CVE-2016-9380 / XSA-198
version 3
delimiter injection vulnerabilities in pygrub
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9381 / XSA-197
version 3
qemu incautious about shared ring processing
UPDATES IN VERSION 3
Added email header syntax to patches, for e.g. git-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9377,CVE-2016-9378 / XSA-196
version 3
x86 software interrupt injection mis-handled
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9383 / XSA-195
version 3
x86 64-bit bit test instruction emulation broken
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-201
ARM guests may induce host asynchronous abort
ISSUE DESCRIPTION
=
Depending on how the hardware and firmware have been integrated,
guest-triggered asynchronous aborts (SE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9637 / XSA-199
version 3
qemu ioport array overflow
UPDATES IN VERSION 3
Clarify the IMPACT description, by escalating privilege to t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9815,CVE-2016-9816,CVE-2016-9817,CVE-2016-9818
/ XSA-201
version 2
ARM guests may induce host asynchronous abort
UPDATES IN VERSION 2
CVEs assigned.
IS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-6258 / XSA-182
version 3
x86: Privilege escalation in PV guests
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-6259 / XSA-183
version 5
x86: Missing SMAP whitelisting in 32-bit exception / event delivery
UPDATES IN VERSION 5
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-5403 / XSA-184
version 2
virtio: unbounded memory allocation issue
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9932 / XSA-200
version 3
x86 CMPXCHG8B emulation fails to ignore operand size override
UPDATES IN VERSION 3
CVE assigned.
Public release.
ISSUE DESC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-204
x86: Mishandling of SYSCALL singlestep during emulation
ISSUE DESCRIPTION
=
The typical behaviour of singlestepping exceptions is determined at the
start of the instruction, w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-10013 / XSA-204
version 2
x86: Mishandling of SYSCALL singlestep during emulation
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-10025 / XSA-203
version 3
x86: missing NULL pointer check in VMFUNC emulation
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-10024 / XSA-202
version 3
x86 PV guests may be able to mask interrupts
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016- / XSA-190
version 5
CR0.TS and CR0.EM not always honored for x86 HVM guests
UPDATES IN VERSION 5
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-9603 / XSA-211
version 2
Cirrus VGA Heap overflow via display refresh
UPDATES IN VERSION 2
Patches for qemu-xen-traditional.
Public release.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-5307,CVE-2015-8104 / XSA-156
version 2
x86: CPU lockup during exception delivery
UPDATES IN VERSION 2
Minor title and text adjustment.
CVE-2015-81
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-163
virtual PMU is unsupported
ISSUE DESCRIPTION
=
The Virtual Performance Measurement Unit feature has been documented
as unsupported, so far only on Intel CPUs. F
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory XSA-161
version 2
WITHDRAWN: missing XSETBV intercept privilege check on AMD SVM
UPDATES IN VERSION 2
Upon further inspection the necessary privilege le
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-3209 / XSA-135
version 3
Heap overflow in QEMU PCNET controller, allowing guest->host escape
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-4164 / XSA-136
version 3
vulnerability in the iret hypercall handler
UPDATES IN VERSION 3
Public release.
Added email header syntax to patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-4163 / XSA-134
version 3
GNTTABOP_swap_grant_ref operation misbehavior
UPDATES IN VERSION 3
Public release.
Added email header syntax to patc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2016-3157 / XSA-171
version 4
I/O port access privilege escalation in x86-64 Linux
UPDATES IN VERSION 4
Clarify Vulnerable Systems section.
Public rel
1 - 100 of 172 matches
Mail list logo