XSA-176 / CVE-2016-4480

41 views
Skip to first unread message

sowowsuc...@onenetbeyond.org

unread,
May 17, 2016, 10:18:51 AM5/17/16
to qubes...@googlegroups.com
hi,

fyi. what do you think in case of qubes os? how big is the impact is any?

as i understand this is only a possible escalation inside guest (eg.
user to root).

x86 software guest page walk PS bit handling flaw
http://xenbits.xen.org/xsa/advisory-176.html

Jeremias E.

unread,
May 17, 2016, 2:50:23 PM5/17/16
to qubes-devel
Hello,

1. "x86 PV guests are not vulnerable"

2. "We have checked with maintainers
of the following operating systems, all of whom have said that to the best of their knowledge their operating system is not vulnerable: Linux, FreeBSD, NetBSD, OpenBSD, and Solaris. Nor has it been observed in common proprietary operating systems."

In qubes os all your Linux VM's which are based on Templates are PV (paravirtualized) guests and according
to the description not vulnerable.



Reply all
Reply to author
Forward
0 new messages