diff options
| author | Fernando Rodrigues <alpha@sigmasquadron.net> | 2025-05-12 14:09:17 -0300 |
|---|---|---|
| committer | Fernando Rodrigues <alpha@sigmasquadron.net> | 2025-05-12 17:16:07 +0000 |
| commit | c29710d4ad60296481c0702da4790a2250f2a7ed (patch) | |
| tree | 98fba12fed6f26c8ed96ad21f96bb07fd7e64939 /pkgs/development/python-modules/termplotlib/gnuplot-subprocess.patch | |
| parent | cff5695f60d6b2753b7563d27c97f10b57ea5101 (diff) | |
xen: patch with XSA-469
Researchers at VU Amsterdam have released Training Solo, detailing
several speculative attacks which bypass current protections.
One issue, which Intel has named Indirect Target Selection, is a bug in
the hardware support for prediction-domain isolation. The mitigation
for this involves both microcode and software changes in Xen.
For more details, see:
1. https://vusec.net/projects/training-solo
2. https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html
Another issue discussed in the Training Solo paper pertains to
classic-BPF. Xen does not have any capability similar to BPF filters,
so is not believed to be affected by this issue.
Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
Diffstat (limited to 'pkgs/development/python-modules/termplotlib/gnuplot-subprocess.patch')
0 files changed, 0 insertions, 0 deletions
