]> xenbits.xensource.com Git - xen.git/commitdiff
SUPPORT.md: Document speculative attacks status of non-shim 32-bit PV
authorIan Jackson <ian.jackson@eu.citrix.com>
Tue, 9 Mar 2021 15:00:47 +0000 (15:00 +0000)
committerJan Beulich <jbeulich@suse.com>
Tue, 4 May 2021 13:00:24 +0000 (15:00 +0200)
This documents, but does not fix, XSA-370.

Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
Signed-off-by: George Dunlap <george.dunlap@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
SUPPORT.md

index 8a28a4c0e9f2eff43e71a6fcc8f25ef875d2bf8f..8e75b5afe995d423b237e24e05448f388da21f78 100644 (file)
@@ -73,7 +73,16 @@ Traditional Xen PV guest
 
 No hardware requirements
 
-    Status: Supported
+    Status, x86_64: Supported
+    Status, x86_32, shim: Supported
+    Status, x86_32, without shim: Supported, with caveats
+
+Due to architectural limitations,
+32-bit PV guests must be assumed to be able to read arbitrary host memory
+using speculative execution attacks.
+Advisories will continue to be issued
+for new vulnerabilities related to un-shimmed 32-bit PV guests
+enabling denial-of-service attacks or privilege escalation attacks.
 
 ### x86/HVM