Hacker News
- Xen Security Advisory: x86 – mishandling of debug exceptions https://xenbits.xen.org/xsa/advisory-260.html 15 comments
- Xen Security Advisory: Information leak via crafted user-supplied CDROM https://xenbits.xen.org/xsa/advisory-258.html 3 comments
- Xen advisory XSA-253 to become public Thursday 2018-01-04 12:00 UTC https://xenbits.xen.org/xsa/ 2 comments
- Xen Advisory – x86 CMPXCHG8B emulation fails to ignore operand size override http://xenbits.xen.org/xsa/advisory-200.html 11 comments
- XSA-156: x86: CPU lockup during exception delivery http://xenbits.xen.org/xsa/advisory-156.html 13 comments
- 8 embargoed Xen Security Advisory to be released on 2015-10-29 http://xenbits.xen.org/xsa/?asdf= 3 comments
- Heap overflow in QEMU PCNET controller, allowing guest-host escape http://xenbits.xen.org/xsa/advisory-135.html 5 comments
- Xen hypervisor memory corruption due to x86 emulator flaw http://xenbits.xen.org/xsa/advisory-123.html 38 comments
- Five new undisclosed Xen vulnerabilities http://xenbits.xen.org/xsa/ 46 comments
- XSA-108 Advisory http://xenbits.xen.org/xsa/advisory-108.html 95 comments
- Xen Security Advisory CVE-2018-8897 https://xenbits.xen.org/xsa/advisory-260.html 3 comments netsec
- XSA-254: "Systems running all versions of Xen are affected" by Meltdown/Spectre https://xenbits.xen.org/xsa/advisory-254.html 6 comments linux
- XSA-254: "Systems running all versions of Xen are affected" by Meltdown/Spectre https://xenbits.xen.org/xsa/advisory-254.html 3 comments netsec
- Expect instance reboots over the next few days https://xenbits.xen.org/xsa/ 24 comments aws
- XSA-156: x86: CPU lockup during exception delivery http://xenbits.xen.org/xsa/advisory-156.html 6 comments netsec
- PSA: AWS may be patching soon - Xen security advisories embargoed till 29 October 2015 http://xenbits.xen.org/xsa/ 11 comments aws
- QEMU guest -> host escape http://xenbits.xen.org/xsa/advisory-135.html 13 comments netsec
- XSA-133 - qemu-xen floppy driver privilege escalation http://xenbits.xen.org/xsa/advisory-133.html 8 comments netsec
- This is the reason all Xen VPS hosts had to be rebooted this week http://xenbits.xen.org/xsa/advisory-123.html 11 comments sysadmin
- XSA-108 - Xen 4.1 Vulnerable To Guest->Host Data Access http://xenbits.xen.org/xsa/advisory-108.html 6 comments sysadmin
- XSA-108 http://xenbits.xen.org/xsa/advisory-108.html 17 comments netsec
- Xen vulnerability that forced amazon to do the restart just release from embargo http://xenbits.xen.org/xsa/advisory-108.html 12 comments aws