|
Message-ID: <ZzONuZFo1-AXNOFd@itl-email>
Date: Tue, 12 Nov 2024 12:17:32 -0500
From: Demi Marie Obenour <demi@...isiblethingslab.com>
To: oss-security@...ts.openwall.com, xen-announce@...ts.xen.org,
xen-devel@...ts.xen.org, xen-users@...ts.xen.org
Cc: "Xen.org security team" <security-team-members@....org>
Subject: Re: Xen Security Advisory 464 v2 (CVE-2024-45819) -
libxl leaks data to PVH guests via ACPI tables
On Tue, Nov 12, 2024 at 12:05:47PM +0000, Xen Security wrote:
> Only PVH guests can leverage the vulnerability. HVM and PV guests
> cannot leverage the vulnerability. Note that PV guests when run inside
> the (PVH) shim can't leverage the vulnerability.
Is this unconditional (perhaps because the relevant data gets zeroed out
by the shim), or does it only apply when the PV guest can't extract data
from the shim's memory? For instance, 32-bit PV guests aren't security
supported anymore, but the PV shim isn't supposed to rely on the
security of the shim itself, only of the rest of the system.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.