[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH] SUPPORT.md: Un-shimmed 32-bit PV guests are no longer supported
The support status of 32-bit guests doesn't seem particularly useful. Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> --- NB this patch should be considered a proposal to the community, as a follow-on to XSA-370. As mentioned in the advisory, we will wait until 25 May for comments before checking it in. --- SUPPORT.md | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) diff --git a/SUPPORT.md b/SUPPORT.md index d0d4fc6f4f..a29680e04c 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -86,14 +86,7 @@ No hardware requirements Status, x86_64: Supported Status, x86_32, shim: Supported - Status, x86_32, without shim: Supported, with caveats - -Due to architectural limitations, -32-bit PV guests must be assumed to be able to read arbitrary host memory -using speculative execution attacks. -Advisories will continue to be issued -for new vulnerabilities related to un-shimmed 32-bit PV guests -enabling denial-of-service attacks or privilege escalation attacks. + Status, x86_32, without shim: Supported, not security supported ### x86/HVM -- 2.30.2
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |