[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] XSA-300 Wording



Could we look at updating the wording of XSA-300 to make things a bit more clear. I don't have exact wording suggestions but roughly some of the questions I've fielded are:


1. Impact should make it clear there are two issues here. So its really "and/or". Or a bulleted list.

2. Vulnerable Systems. "All versions of Linux are vulnerable" does this apply to guests. Only reason that was asked is because the next sentence goes on to discuss dom0. Are people that didn't pass a "dom0_mem=" on a PV dom0 vulnerable or not?

3. Mitigation. Is there no mitigation for PVH dom0's? There's some handwaving around "sufficiently large". Large is subjective to folks. If I operate with machines with 8GB of RAM day in and day out then my definition of "large" is different from someone that operates on machines with 256GB of RAM day in and day out.

4. Resolution. There's two issues here (as the Impact should make clear). Identify that the patch handles issue "#1" while issue "#2" is not fixed yet.


I hope this is a reasonable request.

--

Doug


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.