[Xen-devel] Xen Security Advisory 310 v3 (CVE-2019-19580) - Further issues with restartable PV type change operations

2019-12-11 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-19580 / XSA-310 version 3 Further issues with restartable PV type change operations UPDATES IN VERSION 3 Public release. Updated metadata to add

[Xen-devel] Xen Security Advisory 309 v3 (CVE-2019-19578) - Linear pagetable use / entry miscounts

2019-12-11 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-19578 / XSA-309 version 3 Linear pagetable use / entry miscounts UPDATES IN VERSION 3 Public release. Updated metadata to add 4.13

[Xen-devel] Xen Security Advisory 311 v4 (CVE-2019-19577) - Bugs in dynamic height handling for AMD IOMMU pagetables

2019-12-11 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-19577 / XSA-311 version 4 Bugs in dynamic height handling for AMD IOMMU pagetables UPDATES IN VERSION 4 Public release. Re-base 4.12 patch

[Xen-devel] Xen Security Advisory 307 v3 (CVE-2019-19581, CVE-2019-19582) - find_next_bit() issues

2019-12-11 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-19581,CVE-2019-19582 / XSA-307 version 3 find_next_bit() issues UPDATES IN VERSION 3 Public release. Updated metadata to add 4.13

[Xen-devel] Xen Security Advisory 306 v3 (CVE-2019-19579) - Device quarantine for alternate pci assignment methods

2019-12-05 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-19579 / XSA-306 version 3 Device quarantine for alternate pci assignment methods UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 292 v3 (CVE-2019-17346) - x86: insufficient TLB flushing when using PCID

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17346 / XSA-292 version 3 x86: insufficient TLB flushing when using PCID UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 287 v3 (CVE-2019-17342) - x86: steal_page violates page_struct access discipline

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17342 / XSA-287 version 3 x86: steal_page violates page_struct access discipline UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 284 v3 (CVE-2019-17340) - grant table transfer issues on large hosts

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17340 / XSA-284 version 3 grant table transfer issues on large hosts UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 291 v3 (CVE-2019-17345) - x86/PV: page type reference counting issue with failed IOMMU update

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17345 / XSA-291 version 3 x86/PV: page type reference counting issue with failed IOMMU update UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 285 v3 (CVE-2019-17341) - race with pass-through device hotplug

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17341 / XSA-285 version 3 race with pass-through device hotplug UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 290 v3 (CVE-2019-17344) - missing preemption in x86 PV page table unvalidation

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17344 / XSA-290 version 3 missing preemption in x86 PV page table unvalidation UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 294 v3 (CVE-2019-17348) - x86 shadow: Insufficient TLB flushing when using PCID

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17348 / XSA-294 version 3 x86 shadow: Insufficient TLB flushing when using PCID UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 300 v3 (CVE-2019-17351) - Linux: No grant table and foreign mapping limits

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17351 / XSA-300 version 3 Linux: No grant table and foreign mapping limits UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 288 v3 (CVE-2019-17343) - x86: Inconsistent PV IOMMU discipline

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17343 / XSA-288 version 3 x86: Inconsistent PV IOMMU discipline UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 306 v2 - Device quarantine for alternate pci assignment methods

2019-11-26 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-306 version 2 Device quarantine for alternate pci assignment methods UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 298 v3 (CVE-2019-18425) - missing descriptor table limit checking in x86 PV emulation

2019-10-31 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-18425 / XSA-298 version 3 missing descriptor table limit checking in x86 PV emulation UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 296 v4 (CVE-2019-18420) - VCPUOP_initialise DoS

2019-10-31 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-18420 / XSA-296 version 4 VCPUOP_initialise DoS UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 301 v3 (CVE-2019-18423) - add-to-physmap can be abused to DoS Arm hosts

2019-10-31 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-18423 / XSA-301 version 3 add-to-physmap can be abused to DoS Arm hosts UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 303 v4 (CVE-2019-18422) - ARM: Interrupts are unconditionally unmasked in exception handlers

2019-10-31 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-18422 / XSA-303 version 4 ARM: Interrupts are unconditionally unmasked in exception handlers UPDATES IN VERSION 4 Fix typoes in the series and add

[Xen-devel] Xen Security Advisory 302 v5 (CVE-2019-18424) - passed through PCI devices may corrupt host memory after deassignment

2019-10-31 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-18424 / XSA-302 version 5 passed through PCI devices may corrupt host memory after deassignment UPDATES IN VERSION 5 Public release. The patches

[Xen-devel] dom-u stuck in ---sr- state after reboot

2020-02-20 Thread msd+xen-devel
Hi everyone, Since I use Xen 4.11 on Debian 10, sometimes (about one in twenty times) after a dom-u reboot, it stays stuck with the state '---sr-'. This had never happened for me with Xen 4.4 on Debian 8. I have to manually destroy and reboot the dom-u stuck domain. I can't see any error

[Xen-devel] Xen Security Advisory 312 v1 - arm: a CPU may speculate past the ERET instruction

2020-01-14 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-312 arm: a CPU may speculate past the ERET instruction ISSUE DESCRIPTION = Some CPUs can speculate past an ERET instruction and potentially perform speculative accesses

[Xen-devel] Xen Security Advisory 315 v1 (CVE-2020-0551) - Load Value Injection (LVI) speculative side channel

2020-03-10 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-0551 / XSA-315 Load Value Injection (LVI) speculative side channel ISSUE DESCRIPTION = This is very closely related to the Microarchitectural Data Sampling vulnerabilities from

Xen Security Advisory 313 v3 (CVE-2020-11740,CVE-2020-11741) - multiple xenoprof issues

2020-04-14 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-11740,CVE-2020-11741 / XSA-313 version 3 multiple xenoprof issues UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 316 v3 (CVE-2020-11743) - Bad error path in GNTTABOP_map_grant

2020-04-14 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-11743 / XSA-316 version 3 Bad error path in GNTTABOP_map_grant UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 314 v3 (CVE-2020-11739) - Missing memory barriers in read-write unlock paths

2020-04-14 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-11739 / XSA-314 version 3 Missing memory barriers in read-write unlock paths UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 318 v3 (CVE-2020-11742) - Bad continuation handling in GNTTABOP_copy

2020-04-14 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-11742 / XSA-318 version 3 Bad continuation handling in GNTTABOP_copy UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 331 v2 - Race condition in Linux event handler may crash dom0

2020-10-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-331 version 2 Race condition in Linux event handler may crash dom0 UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 345 v3 - x86: Race condition in Xen mapping code

2020-10-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-345 version 3 x86: Race condition in Xen mapping code UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 332 v3 - Rogue guests can cause DoS of Dom0 via high frequency events

2020-10-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-332 version 3 Rogue guests can cause DoS of Dom0 via high frequency events UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 346 v2 - undue deferral of IOMMU TLB flushes

2020-10-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-346 version 2 undue deferral of IOMMU TLB flushes UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 347 v2 - unsafe AMD IOMMU page table updates

2020-10-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-347 version 2 unsafe AMD IOMMU page table updates UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION = AMD

Xen Security Advisory 335 v2 (CVE-2020-14364) - QEMU: usb: out-of-bounds r/w access issue

2020-08-24 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-14364 / XSA-335 version 2 QEMU: usb: out-of-bounds r/w access issue UPDATES IN VERSION 2 Don't break the DSO by eliding the SoB

Xen Security Advisory 334 v3 (CVE-2020-25598) - Missing unlock in XENMEM_acquire_resource error path

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25598 / XSA-334 version 3 Missing unlock in XENMEM_acquire_resource error path UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 333 v3 (CVE-2020-25602) - x86 pv: Crash when handling guest access to MSR_MISC_ENABLE

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25602 / XSA-333 version 3 x86 pv: Crash when handling guest access to MSR_MISC_ENABLE UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 342 v3 (CVE-2020-25600) - out of bounds event channels available to 32-bit x86 domains

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25600 / XSA-342 version 3 out of bounds event channels available to 32-bit x86 domains UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 340 v3 (CVE-2020-25603) - Missing memory barriers when accessing/allocating an event channel

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25603 / XSA-340 version 3 Missing memory barriers when accessing/allocating an event channel UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 344 v4 (CVE-2020-25601) - lack of preemption in evtchn_reset() / evtchn_destroy()

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25601 / XSA-344 version 4 lack of preemption in evtchn_reset() / evtchn_destroy() UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 337 v3 (CVE-2020-25595) - PCI passthrough code reading back hardware registers

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25595 / XSA-337 version 3 PCI passthrough code reading back hardware registers UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 338 v4 (CVE-2020-25597) - once valid event channels may not turn invalid

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25597 / XSA-338 version 4 once valid event channels may not turn invalid UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 339 v3 (CVE-2020-25596) - x86 pv guest kernel DoS via SYSENTER

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25596 / XSA-339 version 3 x86 pv guest kernel DoS via SYSENTER UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 336 v3 (CVE-2020-25604) - race when migrating timers between x86 HVM vCPU-s

2020-09-22 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-25604 / XSA-336 version 3 race when migrating timers between x86 HVM vCPU-s UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 327 v3 (CVE-2020-15564) - Missing alignment check in VCPUOP_register_vcpu_info

2020-07-07 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-15564 / XSA-327 version 3 Missing alignment check in VCPUOP_register_vcpu_info UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 328 v3 (CVE-2020-15567) - non-atomic modification of live EPT PTE

2020-07-07 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-15567 / XSA-328 version 3 non-atomic modification of live EPT PTE UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 319 v3 (CVE-2020-15563) - inverted code paths in x86 dirty VRAM tracking

2020-07-07 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-15563 / XSA-319 version 3 inverted code paths in x86 dirty VRAM tracking UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 320 v1 (CVE-2020-0543) - Special Register Buffer speculative side channel

2020-06-09 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-0543 / XSA-320 Special Register Buffer speculative side channel ISSUE DESCRIPTION = This issue is related to the MDS and TAA vulnerabilities. Please see https

Xen Security Advisory 320 v2 (CVE-2020-0543) - Special Register Buffer speculative side channel

2020-06-11 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-0543 / XSA-320 version 2 Special Register Buffer speculative side channel UPDATES IN VERSION 2 Add a link to Intel's cross reference

Xen Security Advisory 329 v2 - Linux ioperm bitmap context switching issues

2020-07-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-329 version 2 Linux ioperm bitmap context switching issues UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm bitmap context switching issues

2020-07-21 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-15852 / XSA-329 version 3 Linux ioperm bitmap context switching issues UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 355 v2 - stack corruption from XSA-346 change

2020-11-24 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-355 version 2 stack corruption from XSA-346 change UPDATES IN VERSION 2 Added metadata file. Public release. ISSUE DESCRIPTION

Xen Security Advisory 351 v2 (CVE-2020-28368) - Information leak via power sidechannel

2020-11-26 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-28368 / XSA-351 version 2 Information leak via power sidechannel UPDATES IN VERSION 2 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 359 v3 (CVE-2020-29571) - FIFO event channels control structure ordering

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29571 / XSA-359 version 3 FIFO event channels control structure ordering UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 353 v4 (CVE-2020-29479) - oxenstored: permissions not checked on root node

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29479 / XSA-353 version 4 oxenstored: permissions not checked on root node UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 324 v3 (CVE-2020-29484) - Xenstore: guests can crash xenstored via watchs

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29484 / XSA-324 version 3 Xenstore: guests can crash xenstored via watchs UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 322 v4 (CVE-2020-29481) - Xenstore: new domains inheriting existing node permissions

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29481 / XSA-322 version 4 Xenstore: new domains inheriting existing node permissions UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 325 v3 (CVE-2020-29483) - Xenstore: guests can disturb domain cleanup

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29483 / XSA-325 version 3 Xenstore: guests can disturb domain cleanup UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 323 v3 (CVE-2020-29482) - Xenstore: wrong path length check

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29482 / XSA-323 version 3 Xenstore: wrong path length check UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 350 v4 (CVE-2020-29569) - Use after free triggered by block frontend in Linux blkback

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29569 / XSA-350 version 4 Use after free triggered by block frontend in Linux blkback UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 330 v3 (CVE-2020-29485) - oxenstored memory leak in reset_watches

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29485 / XSA-330 version 3 oxenstored memory leak in reset_watches UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 352 v3 (CVE-2020-29486) - oxenstored: node ownership can be changed by unprivileged clients

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29486 / XSA-352 version 3 oxenstored: node ownership can be changed by unprivileged clients UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 356 v3 (CVE-2020-29567) - infinite loop when cleaning up IRQ vectors

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29567 / XSA-356 version 3 infinite loop when cleaning up IRQ vectors UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 348 v3 (CVE-2020-29566) - undue recursion in x86 HVM context switch code

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29566 / XSA-348 version 3 undue recursion in x86 HVM context switch code UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 354 v4 (CVE-2020-29487) - XAPI: guest-triggered excessive memory usage

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29487 / XSA-354 version 4 XAPI: guest-triggered excessive memory usage UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 358 v5 (CVE-2020-29570) - FIFO event channels control block related ordering

2020-12-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29570 / XSA-358 version 5 FIFO event channels control block related ordering UPDATES IN VERSION 5 "Unstable" patch updated (needed

Xen Security Advisory 349 v3 (CVE-2020-29568) - Frontends can trigger OOM in Backends by update a watched path

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29568 / XSA-349 version 3 Frontends can trigger OOM in Backends by update a watched path UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 358 v4 (CVE-2020-29570) - FIFO event channels control block related ordering

2020-12-15 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29570 / XSA-358 version 4 FIFO event channels control block related ordering UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 322 v5 (CVE-2020-29481) - Xenstore: new domains inheriting existing node permissions

2020-12-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29481 / XSA-322 version 5 Xenstore: new domains inheriting existing node permissions UPDATES IN VERSION 5 Fix deployment info to refer to xsa322

Xen Security Advisory 351 v1 - Information leak via power sidechannel

2020-11-10 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-351 Information leak via power sidechannel ISSUE DESCRIPTION = Researchers have demonstrated using software power/energy monitoring interfaces to create covert

Xen Security Advisory 351 v1 - Information leak via power sidechannel

2020-11-10 Thread Xen . org security team
(Copy of advisory) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-351 Information leak via power sidechannel ISSUE DESCRIPTION = Researchers have demonstrated using software power/energy monitoring interfaces

Xen Security Advisory 286 v5 - x86 PV guest INVLPG-like flushes may leave stale TLB entries

2020-11-03 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-286 version 5 x86 PV guest INVLPG-like flushes may leave stale TLB entries UPDATES IN VERSION 5 Patches rewritten to use a completely different

Xen Security Advisory 355 v3 (CVE-2020-29040) - stack corruption from XSA-346 change

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-29040 / XSA-355 version 3 stack corruption from XSA-346 change UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 331 v3 (CVE-2020-27675) - Race condition in Linux event handler may crash dom0

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-27675 / XSA-331 version 3 Race condition in Linux event handler may crash dom0 UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 286 v6 (CVE-2020-27674) - x86 PV guest INVLPG-like flushes may leave stale TLB entries

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-27674 / XSA-286 version 6 x86 PV guest INVLPG-like flushes may leave stale TLB entries UPDATES IN VERSION 6 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 360 v1 - IRQ vector leak on x86

2021-01-21 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-360 IRQ vector leak on x86 ISSUE DESCRIPTION = A x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system

Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency events

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-27673 / XSA-332 version 4 Rogue guests can cause DoS of Dom0 via high frequency events UPDATES IN VERSION 4 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 346 v3 (CVE-2020-27671) - undue deferral of IOMMU TLB flushes

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-27671 / XSA-346 version 3 undue deferral of IOMMU TLB flushes UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 347 v3 (CVE-2020-27670) - unsafe AMD IOMMU page table updates

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-27670 / XSA-347 version 3 unsafe AMD IOMMU page table updates UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 345 v4 (CVE-2020-27672) - x86: Race condition in Xen mapping code

2021-01-19 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2020-27672 / XSA-345 version 4 x86: Race condition in Xen mapping code UPDATES IN VERSION 4 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 360 v2 (CVE-2021-3308) - IRQ vector leak on x86

2021-01-26 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-3308 / XSA-360 version 2 IRQ vector leak on x86 UPDATES IN VERSION 2 CVE assigned. ISSUE DESCRIPTION = An x86

Xen Security Advisory 377 v2 (CVE-2021-28690) - x86: TSX Async Abort protections not restored after S3

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28690 / XSA-377 version 2 x86: TSX Async Abort protections not restored after S3 UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 375 v2 (CVE-2021-0089) - Speculative Code Store Bypass

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-0089 / XSA-375 version 2 Speculative Code Store Bypass UPDATES IN VERSION 2 New 4.12 backport (also targeting 4.11), addressing

Xen Security Advisory 372 v3 (CVE-2021-28693) - xen/arm: Boot modules are not scrubbed

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28693 / XSA-372 version 3 xen/arm: Boot modules are not scrubbed UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 374 v2 (CVE-2021-28691) - Guest triggered use-after-free in Linux xen-netback

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28691 / XSA-374 version 2 Guest triggered use-after-free in Linux xen-netback UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 375 v3 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass

2021-06-09 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-0089,CVE-2021-26313 / XSA-375 version 3 Speculative Code Store Bypass UPDATES IN VERSION 3 Added additional CVE, as Intel and AMD

Xen Security Advisory 375 v4 (CVE-2021-0089,CVE-2021-26313) - Speculative Code Store Bypass

2021-06-10 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-0089,CVE-2021-26313 / XSA-375 version 4 Speculative Code Store Bypass UPDATES IN VERSION 4 Correct the link to the AMD bulletin. ISSUE

Xen Security Advisory 370 v2 (CVE-2021-28689) - x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests

2021-05-04 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28689 / XSA-370 version 2 x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests UPDATES IN VERSION 2 Note that the patch is docs

Xen Security Advisory 371 v3 (CVE-2021-28688) - Linux: blkback driver may leak persistent grants

2021-03-30 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28688 / XSA-371 version 3 Linux: blkback driver may leak persistent grants UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 368 v2 - HVM soft-reset crashes toolstack

2021-03-18 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-368 version 2 HVM soft-reset crashes toolstack UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION = libxl

Xen Security Advisory 368 v3 (CVE-2021-28687) - HVM soft-reset crashes toolstack

2021-03-18 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28687 / XSA-368 version 3 HVM soft-reset crashes toolstack UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 367 v1 - Linux: netback fails to honor grant mapping errors

2021-03-04 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-367 Linux: netback fails to honor grant mapping errors ISSUE DESCRIPTION = XSA-362 tried to address issues here, but in the case of the netback driver the changes were

Xen Security Advisory 369 v1 - Linux: special config may crash when trying to map foreign pages

2021-03-04 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-369 Linux: special config may crash when trying to map foreign pages ISSUE DESCRIPTION = With CONFIG_XEN_BALLOON_MEMORY_HOTPLUG disabled and CONFIG_XEN_UNPOPULATED_ALLOC enabled

Xen Security Advisory 366 v2 (CVE-2021-27379) - missed flush in XSA-321 backport

2021-02-23 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-27379 / XSA-366 version 2 missed flush in XSA-321 backport UPDATES IN VERSION 2 CVE assigned. Fixed erroneous reference to XSA-320

Xen Security Advisory 367 v2 (CVE-2021-28038) - Linux: netback fails to honor grant mapping errors

2021-03-05 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28038 / XSA-367 version 2 Linux: netback fails to honor grant mapping errors UPDATES IN VERSION 2 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages

2021-03-05 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28039 / XSA-369 version 2 Linux: special config may crash when trying to map foreign pages UPDATES IN VERSION 2 CVE assigned. ISSUE DESCRIPTION

Xen Security Advisory 365 v3 (CVE-2021-26930) - Linux: error handling issues in blkback's grant mapping

2021-02-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-26930 / XSA-365 version 3 Linux: error handling issues in blkback's grant mapping UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 362 v3 (CVE-2021-26931) - Linux: backends treating grant mapping errors as bugs

2021-02-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-26931 / XSA-362 version 3 Linux: backends treating grant mapping errors as bugs UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 363 v3 (CVE-2021-26934) - Linux: display frontend "be-alloc" mode is unsupported

2021-02-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-26934 / XSA-363 version 3 Linux: display frontend "be-alloc" mode is unsupported UPDATES IN VERSION 3 Public release. ISSUE D

Xen Security Advisory 364 v3 (CVE-2021-26933) - arm: The cache may not be cleaned for newly allocated scrubbed pages

2021-02-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-26933 / XSA-364 version 3 arm: The cache may not be cleaned for newly allocated scrubbed pages UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

Xen Security Advisory 361 v4 (CVE-2021-26932) - Linux: grant mapping error handling issues

2021-02-16 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-26932 / XSA-361 version 4 Linux: grant mapping error handling issues UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION

Xen Security Advisory 366 v1 - missed flush in XSA-321 backport

2021-02-18 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-366 missed flush in XSA-321 backport ISSUE DESCRIPTION = An oversight was made when backporting XSA-320, leading entries in the IOMMU not being properly updated

<    1   2   3   >