Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE
xen.28173
xsa370.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File xsa370.patch of Package xen.28173
Subject: SUPPORT.md: Document speculative attacks status of non-shim 32-bit PV From: Ian Jackson ian.jackson@eu.citrix.com Tue Mar 9 15:00:47 2021 +0000 Date: Tue May 4 14:59:44 2021 +0200: Git: 5984905b2638df87a0262d1ee91f0a6e14a86df6 This documents, but does not fix, XSA-370. Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com> Signed-off-by: George Dunlap <george.dunlap@citrix.com> Acked-by: Jan Beulich <jbeulich@suse.com> diff --git a/SUPPORT.md b/SUPPORT.md index 79ebd51fb8..19f85cadf6 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -79,7 +79,16 @@ Traditional Xen PV guest No hardware requirements - Status: Supported + Status, x86_64: Supported + Status, x86_32, shim: Supported + Status, x86_32, without shim: Supported, with caveats + +Due to architectural limitations, +32-bit PV guests must be assumed to be able to read arbitrary host memory +using speculative execution attacks. +Advisories will continue to be issued +for new vulnerabilities related to un-shimmed 32-bit PV guests +enabling denial-of-service attacks or privilege escalation attacks. ### x86/HVM
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor