June 23, 15 |
11:29 |
[Xen-announce] Xen 4.5.1 released |
Lars Kurth |
|
June 11, 15 |
12:30 |
[Xen-announce] Xen Security Advisory 136 (CVE-2015-4164) - vulnerability in the iret hypercall handler |
Xen . org security team |
|
12:29 |
[Xen-announce] Xen Security Advisory 134 (CVE-2015-4163) - GNTTABOP_swap_grant_ref operation misbehavior |
Xen . org security team |
|
June 10, 15 |
14:10 |
[Xen-announce] Xen Security Advisory 135 (CVE-2015-3209) - Heap overflow in QEMU PCNET controller, allowing guest->host escape |
Xen . org security team |
|
June 02, 15 |
14:05 |
[Xen-announce] Xen Security Advisory 131 (CVE-2015-4106) - Unmediated PCI register access in qemu |
Xen . org security team |
|
14:04 |
[Xen-announce] Xen Security Advisory 130 (CVE-2015-4105) - Guest triggerable qemu MSI-X pass-through error messages |
Xen . org security team |
|
14:04 |
[Xen-announce] Xen Security Advisory 129 (CVE-2015-4104) - PCI MSI mask bits inadvertently exposed to guests |
Xen . org security team |
|
14:04 |
[Xen-announce] Xen Security Advisory 128 (CVE-2015-4103) - Potential unintended writes to host MSI message data field via qemu |
Xen . org security team |
|