xen-announce Mail Thread Index
- [Xen-announce] Xen Security Advisory 126 (CVE-2015-2756) - Unmediated PCI command register access in qemu,
Xen . org security team
- [Xen-announce] Xen Security Advisory 127 (CVE-2015-2751) - Certain domctl operations may be abused to lock up the host,
Xen . org security team
- [Xen-announce] Xen Security Advisory 125 (CVE-2015-2752) - Long latency MMIO mapping operations are not preemptible,
Xen . org security team
- [Xen-announce] Xen 4.4.2 released,
Lars Kurth
- [Xen-announce] Xen 4.3.4 released,
Lars Kurth
- [Xen-announce] Xen Security Advisory 98 (CVE-2014-3969) - insufficient permissions checks accessing guest memory on ARM,
Xen . org security team
- [Xen-announce] Xen Security Advisory 119 (CVE-2015-2152) - HVM qemu unexpectedly enabling emulated VGA graphics backends,
Xen . org security team
- [Xen-announce] Xen Security Advisory 123 (CVE-2015-2151) - Hypervisor memory corruption due to x86 emulator flaw,
Xen . org security team
- [Xen-announce] Xen Security Advisory 120 (CVE-2015-2150) - Non-maskable interrupts triggerable by guests,
Xen . org security team
- [Xen-announce] Xen Security Advisory 124 - Non-standard PCI device functionality may render pass-through insecure,
Xen . org security team
- [Xen-announce] Xen Security Advisory 122 (CVE-2015-2045) - Information leak through version information hypercall,
Xen . org security team
- [Xen-announce] Xen Security Advisory 121 (CVE-2015-2044) - Information leak via internal x86 system device emulation,
Xen . org security team
- [Xen-announce] Updates to Xen Project Security Process,
Lars Kurth
Mail converted by MHonArc
|