[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: Xen Security Advisory 360 v1 - IRQ vector leak on x86
On Thu, Jan 21, 2021 at 02:10:48PM +0000, Xen.org security team wrote: > Xen Security Advisory XSA-360 > > IRQ vector leak on x86 > > ISSUE DESCRIPTION > ================= > > A x86 HVM guest with PCI pass through devices can force the allocation > of all IDT vectors on the system by rebooting itself with MSI or MSI-X > capabilities enabled and entries setup. (...) > MITIGATION > ========== > > Not running HVM guests with PCI pass through devices will avoid the > vulnerability. Note that even non-malicious guests can trigger this > vulnerability as part of normal operation. Does the 'on_reboot="destroy"' mitigate the issue too? Or on_soft_reset? -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? Attachment:
signature.asc
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |