[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH 0/4] x86: XSA-156 follow-ups

Not much interrelation between them other than all having been
noticed while looking into the various aspects of XSA-156 (including
the investigations regarding possible further similar exploit

1: x86/HVM: don't inject #DB with error code
2: x86/HVM: unify and fix #UD intercept
3: x86/SVM: don't exceed segment limit when fetching instruction bytes
4: x86/traps: honor EXT bit in error codes

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.