[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 0/4] x86: XSA-156 follow-ups
Not much interrelation between them other than all having been noticed while looking into the various aspects of XSA-156 (including the investigations regarding possible further similar exploit mechanisms). 1: x86/HVM: don't inject #DB with error code 2: x86/HVM: unify and fix #UD intercept 3: x86/SVM: don't exceed segment limit when fetching instruction bytes 4: x86/traps: honor EXT bit in error codes Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |