From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Clark, Robert Graham" Subject: SYSRET 64-Bit Breakout Date: Wed, 13 Jun 2012 12:26:48 +0000 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT To: "kvm@vger.kernel.org" Return-path: Received: from g4t0015.houston.hp.com ([15.201.24.18]:39547 "EHLO g4t0015.houston.hp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754012Ab2FMM2O convert rfc822-to-8bit (ORCPT ); Wed, 13 Jun 2012 08:28:14 -0400 Received: from G5W2206G.americas.hpqcorp.net (g5w2206g.atlanta.hp.com [16.228.43.185]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g4t0015.houston.hp.com (Postfix) with ESMTPS id AD43085ED for ; Wed, 13 Jun 2012 12:28:13 +0000 (UTC) Content-Language: en-US Content-ID: Sender: kvm-owner@vger.kernel.org List-ID: All, I've been looking at http://www.kb.cert.org/vuls/id/649219 Xen appears to be vulnerable as do a number of other products. KVM isn't listed. Some discussion on IRC indicates that KVM isn't likely to be vulnerable. Can anyone confirm please? -Rob