-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-19580 / XSA-310
version 3
Further issues with restartable PV type change operations
UPDATES IN VERSION 3
Public release.
Updated metadata to add
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-19578 / XSA-309
version 3
Linear pagetable use / entry miscounts
UPDATES IN VERSION 3
Public release.
Updated metadata to add 4.13
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-19577 / XSA-311
version 4
Bugs in dynamic height handling for AMD IOMMU pagetables
UPDATES IN VERSION 4
Public release.
Re-base 4.12 patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-19581,CVE-2019-19582 / XSA-307
version 3
find_next_bit() issues
UPDATES IN VERSION 3
Public release.
Updated metadata to add 4.13
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-19579 / XSA-306
version 3
Device quarantine for alternate pci assignment methods
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17346 / XSA-292
version 3
x86: insufficient TLB flushing when using PCID
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17342 / XSA-287
version 3
x86: steal_page violates page_struct access discipline
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17340 / XSA-284
version 3
grant table transfer issues on large hosts
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17345 / XSA-291
version 3
x86/PV: page type reference counting issue with failed IOMMU update
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17341 / XSA-285
version 3
race with pass-through device hotplug
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17344 / XSA-290
version 3
missing preemption in x86 PV page table unvalidation
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17348 / XSA-294
version 3
x86 shadow: Insufficient TLB flushing when using PCID
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17351 / XSA-300
version 3
Linux: No grant table and foreign mapping limits
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-17343 / XSA-288
version 3
x86: Inconsistent PV IOMMU discipline
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-306
version 2
Device quarantine for alternate pci assignment methods
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-18425 / XSA-298
version 3
missing descriptor table limit checking in x86 PV emulation
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-18420 / XSA-296
version 4
VCPUOP_initialise DoS
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-18423 / XSA-301
version 3
add-to-physmap can be abused to DoS Arm hosts
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-18422 / XSA-303
version 4
ARM: Interrupts are unconditionally unmasked in exception handlers
UPDATES IN VERSION 4
Fix typoes in the series and add
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2019-18424 / XSA-302
version 5
passed through PCI devices may corrupt host memory after deassignment
UPDATES IN VERSION 5
Public release.
The patches
Hi everyone,
Since I use Xen 4.11 on Debian 10, sometimes (about one in twenty times)
after a dom-u reboot, it stays stuck with the state '---sr-'.
This had never happened for me with Xen 4.4 on Debian 8.
I have to manually destroy and reboot the dom-u stuck domain.
I can't see any error
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-312
arm: a CPU may speculate past the ERET instruction
ISSUE DESCRIPTION
=
Some CPUs can speculate past an ERET instruction and potentially perform
speculative accesses
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-0551 / XSA-315
Load Value Injection (LVI) speculative side channel
ISSUE DESCRIPTION
=
This is very closely related to the Microarchitectural Data Sampling
vulnerabilities from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-11740,CVE-2020-11741 / XSA-313
version 3
multiple xenoprof issues
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-11743 / XSA-316
version 3
Bad error path in GNTTABOP_map_grant
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-11739 / XSA-314
version 3
Missing memory barriers in read-write unlock paths
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-11742 / XSA-318
version 3
Bad continuation handling in GNTTABOP_copy
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-331
version 2
Race condition in Linux event handler may crash dom0
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-345
version 3
x86: Race condition in Xen mapping code
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-332
version 3
Rogue guests can cause DoS of Dom0 via high frequency events
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-346
version 2
undue deferral of IOMMU TLB flushes
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-347
version 2
unsafe AMD IOMMU page table updates
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
AMD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-14364 / XSA-335
version 2
QEMU: usb: out-of-bounds r/w access issue
UPDATES IN VERSION 2
Don't break the DSO by eliding the SoB
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25598 / XSA-334
version 3
Missing unlock in XENMEM_acquire_resource error path
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25602 / XSA-333
version 3
x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25600 / XSA-342
version 3
out of bounds event channels available to 32-bit x86 domains
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25603 / XSA-340
version 3
Missing memory barriers when accessing/allocating an event channel
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25601 / XSA-344
version 4
lack of preemption in evtchn_reset() / evtchn_destroy()
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25595 / XSA-337
version 3
PCI passthrough code reading back hardware registers
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25597 / XSA-338
version 4
once valid event channels may not turn invalid
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25596 / XSA-339
version 3
x86 pv guest kernel DoS via SYSENTER
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-25604 / XSA-336
version 3
race when migrating timers between x86 HVM vCPU-s
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-15564 / XSA-327
version 3
Missing alignment check in VCPUOP_register_vcpu_info
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-15567 / XSA-328
version 3
non-atomic modification of live EPT PTE
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-15563 / XSA-319
version 3
inverted code paths in x86 dirty VRAM tracking
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-0543 / XSA-320
Special Register Buffer speculative side channel
ISSUE DESCRIPTION
=
This issue is related to the MDS and TAA vulnerabilities. Please see
https
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-0543 / XSA-320
version 2
Special Register Buffer speculative side channel
UPDATES IN VERSION 2
Add a link to Intel's cross reference
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-329
version 2
Linux ioperm bitmap context switching issues
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-15852 / XSA-329
version 3
Linux ioperm bitmap context switching issues
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-355
version 2
stack corruption from XSA-346 change
UPDATES IN VERSION 2
Added metadata file.
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-28368 / XSA-351
version 2
Information leak via power sidechannel
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29571 / XSA-359
version 3
FIFO event channels control structure ordering
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29479 / XSA-353
version 4
oxenstored: permissions not checked on root node
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29484 / XSA-324
version 3
Xenstore: guests can crash xenstored via watchs
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29481 / XSA-322
version 4
Xenstore: new domains inheriting existing node permissions
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29483 / XSA-325
version 3
Xenstore: guests can disturb domain cleanup
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29482 / XSA-323
version 3
Xenstore: wrong path length check
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29569 / XSA-350
version 4
Use after free triggered by block frontend in Linux blkback
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29485 / XSA-330
version 3
oxenstored memory leak in reset_watches
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29486 / XSA-352
version 3
oxenstored: node ownership can be changed by unprivileged clients
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29567 / XSA-356
version 3
infinite loop when cleaning up IRQ vectors
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29566 / XSA-348
version 3
undue recursion in x86 HVM context switch code
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29487 / XSA-354
version 4
XAPI: guest-triggered excessive memory usage
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29570 / XSA-358
version 5
FIFO event channels control block related ordering
UPDATES IN VERSION 5
"Unstable" patch updated (needed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29568 / XSA-349
version 3
Frontends can trigger OOM in Backends by update a watched path
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29570 / XSA-358
version 4
FIFO event channels control block related ordering
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29481 / XSA-322
version 5
Xenstore: new domains inheriting existing node permissions
UPDATES IN VERSION 5
Fix deployment info to refer to xsa322
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-351
Information leak via power sidechannel
ISSUE DESCRIPTION
=
Researchers have demonstrated using software power/energy monitoring
interfaces to create covert
(Copy of advisory)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-351
Information leak via power sidechannel
ISSUE DESCRIPTION
=
Researchers have demonstrated using software power/energy monitoring
interfaces
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-286
version 5
x86 PV guest INVLPG-like flushes may leave stale TLB entries
UPDATES IN VERSION 5
Patches rewritten to use a completely different
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-29040 / XSA-355
version 3
stack corruption from XSA-346 change
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-27675 / XSA-331
version 3
Race condition in Linux event handler may crash dom0
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-27674 / XSA-286
version 6
x86 PV guest INVLPG-like flushes may leave stale TLB entries
UPDATES IN VERSION 6
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-360
IRQ vector leak on x86
ISSUE DESCRIPTION
=
A x86 HVM guest with PCI pass through devices can force the allocation
of all IDT vectors on the system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-27673 / XSA-332
version 4
Rogue guests can cause DoS of Dom0 via high frequency events
UPDATES IN VERSION 4
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-27671 / XSA-346
version 3
undue deferral of IOMMU TLB flushes
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-27670 / XSA-347
version 3
unsafe AMD IOMMU page table updates
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-27672 / XSA-345
version 4
x86: Race condition in Xen mapping code
UPDATES IN VERSION 4
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-3308 / XSA-360
version 2
IRQ vector leak on x86
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
=
An x86
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28690 / XSA-377
version 2
x86: TSX Async Abort protections not restored after S3
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-0089 / XSA-375
version 2
Speculative Code Store Bypass
UPDATES IN VERSION 2
New 4.12 backport (also targeting 4.11), addressing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28693 / XSA-372
version 3
xen/arm: Boot modules are not scrubbed
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28691 / XSA-374
version 2
Guest triggered use-after-free in Linux xen-netback
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-0089,CVE-2021-26313 / XSA-375
version 3
Speculative Code Store Bypass
UPDATES IN VERSION 3
Added additional CVE, as Intel and AMD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-0089,CVE-2021-26313 / XSA-375
version 4
Speculative Code Store Bypass
UPDATES IN VERSION 4
Correct the link to the AMD bulletin.
ISSUE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28689 / XSA-370
version 2
x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests
UPDATES IN VERSION 2
Note that the patch is docs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28688 / XSA-371
version 3
Linux: blkback driver may leak persistent grants
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-368
version 2
HVM soft-reset crashes toolstack
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
libxl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28687 / XSA-368
version 3
HVM soft-reset crashes toolstack
UPDATES IN VERSION 3
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-367
Linux: netback fails to honor grant mapping errors
ISSUE DESCRIPTION
=
XSA-362 tried to address issues here, but in the case of the netback
driver the changes were
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-369
Linux: special config may crash when trying to map foreign pages
ISSUE DESCRIPTION
=
With CONFIG_XEN_BALLOON_MEMORY_HOTPLUG disabled and
CONFIG_XEN_UNPOPULATED_ALLOC enabled
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-27379 / XSA-366
version 2
missed flush in XSA-321 backport
UPDATES IN VERSION 2
CVE assigned.
Fixed erroneous reference to XSA-320
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28038 / XSA-367
version 2
Linux: netback fails to honor grant mapping errors
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-28039 / XSA-369
version 2
Linux: special config may crash when trying to map foreign pages
UPDATES IN VERSION 2
CVE assigned.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26930 / XSA-365
version 3
Linux: error handling issues in blkback's grant mapping
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26931 / XSA-362
version 3
Linux: backends treating grant mapping errors as bugs
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26934 / XSA-363
version 3
Linux: display frontend "be-alloc" mode is unsupported
UPDATES IN VERSION 3
Public release.
ISSUE D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26933 / XSA-364
version 3
arm: The cache may not be cleaned for newly allocated scrubbed pages
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26932 / XSA-361
version 4
Linux: grant mapping error handling issues
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-366
missed flush in XSA-321 backport
ISSUE DESCRIPTION
=
An oversight was made when backporting XSA-320, leading entries in the
IOMMU not being properly updated
101 - 200 of 281 matches
Mail list logo