From: Ian Jackson Date: Tue, 9 Mar 2021 15:00:47 +0000 (+0000) Subject: SUPPORT.md: Document speculative attacks status of non-shim 32-bit PV X-Git-Tag: 4.16.0-rc1~521 X-Git-Url: http://xenbits.xensource.com/gitweb?a=commitdiff_plain;h=ec4b43107f8663b4a3cf6b9605e1d80152a89f49;p=xen.git SUPPORT.md: Document speculative attacks status of non-shim 32-bit PV This documents, but does not fix, XSA-370. Reported-by: Jann Horn Signed-off-by: Ian Jackson Signed-off-by: George Dunlap Acked-by: Jan Beulich --- diff --git a/SUPPORT.md b/SUPPORT.md index d0b8afe41c..d0d4fc6f4f 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -84,7 +84,16 @@ Traditional Xen PV guest No hardware requirements - Status: Supported + Status, x86_64: Supported + Status, x86_32, shim: Supported + Status, x86_32, without shim: Supported, with caveats + +Due to architectural limitations, +32-bit PV guests must be assumed to be able to read arbitrary host memory +using speculative execution attacks. +Advisories will continue to be issued +for new vulnerabilities related to un-shimmed 32-bit PV guests +enabling denial-of-service attacks or privilege escalation attacks. ### x86/HVM