Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Oct 2023 22:12:13 +0200
From: Solar Designer <>
	" security team" <>
Subject: Re: Xen Security Advisory 439 v1 (CVE-2023-20588) - x86/AMD: Divide speculative information leak

On Tue, Sep 26, 2023 at 09:59:19PM -0400, Demi Marie Obenour wrote:
> These detailed security advisories are one of the things I love about
> Xen.  It's hard to trust a hypervisor (KVM) that will not issue them,
> for then one has no way to know if a particular problem got fixed.

I concur.  I'd appreciate security advisories from the KVM project.

> I'm CCing KVM here to make sure they have a fix.  From their Git commit
> history, I am almost certain that seL4 does not.  I'm CCing the seL4
> developers to alert them of this and suggest that the x86 port be
> removed or at least have a big warning.

I strongly oppose removal of a port/support for a certain architecture
just because some implementations of it are/were problematic.  Adding a
warning is fine.


P.S. Demi Marie, please note that oss-security list content guidelines
explicitly discourage CC'ing other lists(*), and Xen advisories are
already stretching this.  In this reply, I am still CC'ing many of what
you had CC'ed as I am following up on your specific points relevant to
those lists, but in general let's be more careful about this.

(*) Because we may then get off-topic follow-ups from there, especially
if CC'ing project user lists or high-volume lists like LKML.  In this
specific case, we're lucky so far.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.