Re: [Xen-devel] Xen Security Advisory 173 (CVE-2016-3960) - x86 shadow pagetables: address width overflow

2016-05-13 Thread Jan Beulich
>>> On 13.05.16 at 12:55, wrote: > Am 18.04.2016 um 15:31 schrieb Xen.org security team: >> +/* >> + * Bit 24 of a 24-bit flag mask! This is not any bit of a real pte, >> + * and is only used for signalling in variables that contain flags. >> + */ >> +#define _PAGE_INVALID_BIT (1U<<24) >> + >> #

Re: [Xen-devel] Xen Security Advisory 173 (CVE-2016-3960) - x86 shadow pagetables: address width overflow

2016-05-13 Thread Philipp Hahn
Hi, Am 18.04.2016 um 15:31 schrieb Xen.org security team: > Xen Security Advisory CVE-2016-3960 / XSA-173 > version 3 > > x86 shadow pagetables: address width overflow ... > ISSUE DESCRIPTION > = > In the x86 shadow pagetable

[Xen-devel] Xen Security Advisory 173 (CVE-2016-3960) - x86 shadow pagetables: address width overflow

2016-04-18 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2016-3960 / XSA-173 version 3 x86 shadow pagetables: address width overflow UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION ===