Message ID | 20210506122915.65108-1-george.dunlap@citrix.com (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | SUPPORT.md: Un-shimmed 32-bit PV guests are no longer supported | expand |
> On May 6, 2021, at 1:29 PM, George Dunlap <george.dunlap@citrix.com> wrote: > > The support status of 32-bit guests doesn't seem particularly useful. > > Signed-off-by: George Dunlap <george.dunlap@citrix.com> > --- > > NB this patch should be considered a proposal to the community, as a > follow-on to XSA-370. As mentioned in the advisory, we will wait > until 25 May for comments before checking it in. Sorry, this is an old version of the patch; sending out a new version. -George
diff --git a/SUPPORT.md b/SUPPORT.md index d0d4fc6f4f..a29680e04c 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -86,14 +86,7 @@ No hardware requirements Status, x86_64: Supported Status, x86_32, shim: Supported - Status, x86_32, without shim: Supported, with caveats - -Due to architectural limitations, -32-bit PV guests must be assumed to be able to read arbitrary host memory -using speculative execution attacks. -Advisories will continue to be issued -for new vulnerabilities related to un-shimmed 32-bit PV guests -enabling denial-of-service attacks or privilege escalation attacks. + Status, x86_32, without shim: Supported, not security supported ### x86/HVM
The support status of 32-bit guests doesn't seem particularly useful. Signed-off-by: George Dunlap <george.dunlap@citrix.com> --- NB this patch should be considered a proposal to the community, as a follow-on to XSA-370. As mentioned in the advisory, we will wait until 25 May for comments before checking it in. --- SUPPORT.md | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-)