Patch 1 was sent out before (as replacement proposal to another
patch), and is unchanged (still awaiting feedback, but fitting pretty
nicely with the topic of XSA-170).

Patch 2 fixes the actual problem which was reported to us,
resulting in XSA-170.

The remaining patches are only loosely related, but were
found desirable / put together in the course of investigating
the security issue.

1: x86emul: fix rIP handling
2: x86emul: limit-check branch targets
3: x86emul: simplify IRET logic
4: VMX: fold redundant code
5: x86: drop failsafe callback invocation from assembly

Signed-off-by: Jan Beulich <jbeul...@suse.com>


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to