summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/rangehttpserver
diff options
context:
space:
mode:
authorFernando Rodrigues <alpha@sigmasquadron.net>2025-05-12 14:09:17 -0300
committerFernando Rodrigues <alpha@sigmasquadron.net>2025-05-12 17:16:07 +0000
commitc29710d4ad60296481c0702da4790a2250f2a7ed (patch)
tree98fba12fed6f26c8ed96ad21f96bb07fd7e64939 /pkgs/development/python-modules/rangehttpserver
parentcff5695f60d6b2753b7563d27c97f10b57ea5101 (diff)
xen: patch with XSA-469
Researchers at VU Amsterdam have released Training Solo, detailing several speculative attacks which bypass current protections. One issue, which Intel has named Indirect Target Selection, is a bug in the hardware support for prediction-domain isolation. The mitigation for this involves both microcode and software changes in Xen. For more details, see: 1. https://vusec.net/projects/training-solo 2. https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html Another issue discussed in the Training Solo paper pertains to classic-BPF. Xen does not have any capability similar to BPF filters, so is not believed to be affected by this issue. Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions