-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 2018-08-20 20:19, jonbrownmaste...@gmail.com wrote: > So the new Foreshadow exploit bypasses all Intel CPU protections > even secure enclaves SGX promised to solve. Additionally it > bypasses all VM protections. Check it out below: > > https://foreshadowattack.eu/ >
With respect to Qubes and Xen, "Foreshadow" is another name for CVE-2018-3620 and CVE-2018-3646 (CVE-2018-3615 doesn't apply Xen, since it doesn't currenty use SGX), which we've been discussing in this thread: https://groups.google.com/d/topic/qubes-users/Isn_hko7tQs/discussion - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlt7bFwACgkQ203TvDlQ MDDvlA//U5HMGhY59cOLy2UmigJ049+gDJjYerjf74kO+4Oz8prH9qvxRRfb/u7x M3+TQuz1Tum5IsxqjhQB6wwQdYHRvwpzyawwQoIWF5uMQeCsv+QBC6eRiSfSrMMF ef8f50unVjkk9aGRhoV3BKSW3N1XgFeowBR4ifUul4PO0xwOygdO57Jz2HhL/ViP 3FWqg82xwF2z7lc3YHzrsWd7UUI1/CuUA2lgUm8pgB8sxs6CkQ7fPDt9AAViiowR mUo5uoqgm6j3W26Nx5Gj0zixj2aYxOZnalc1Kwk7ViovCrsUwDpYM2p/JEQnpf00 PF6ttA9FvdFywf5flDIn6BLaaKbWlVoW4fLPXTD9Lr4/DdNVDt42Cp7y51GIFxPB 1a6rGtVxBBlgcBT7yonhWBxudy13KMe3bZkWp341t6uH+G+3X4JHc/tiKN8eSjLM tqxfhRceAoolB6jkH3c8oDVy6Iez9p0GqaoTHtFm+i5skUOD35Kb4zKNvjoUpgpu 5BOrhN0PavW26uPi1SOibp0cUUOck6bSH541Rkljh1VKZb4on3tOxzSXJkmB5op8 qEHIQv26ICqLe45BtCdH429yEzVSHJNYDbZMsZJAXeXaHX+VCNn8oaMJRDf52M4Y eNGzGNaywlErei/PKAevzjzAHX+kJXhyyf762/A8xV6QRbc6O4Y= =d4VQ -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d2cee707-ba70-a494-e153-2597681554a6%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.