Re: [CentOS-virt] Xen 4.4 Immediate EOL
On Fri, Jan 19, 2018 at 12:17 PM, Pasi Kärkkäinenwrote: > On Thu, Jan 18, 2018 at 11:48:35AM -0600, Kevin Stange wrote: >> Hi, >> > > Hi, > >> I am very sorry to do this on short notice, but obviously Meltdown and >> Spectre are a lot more than anyone was really expecting to come down the >> pipeline. Xen 4.4 has been EOL upstream for about a year now and I have >> personally been reviewing and backporting patches based on the 4.5 >> versions made available upstream. >> >> Given that 4.5 is now also reaching EOL, backporting to 4.4 will become >> harder and I've already taken steps to vacate 4.4 in my own environment >> ASAP. Spectre and Meltdown patches most likely will only officially >> reach 4.6 and are very complicated. Ultimately, I don't think this is a >> constructive use of my time. Therefore, I will NOT be continuing to >> provide updated Xen 4.4 builds any longer through CentOS Virt SIG. If >> someone else would like to take on the job, you're welcome to try. Pop >> by #centos-virt on Freenode to talk to us there if you're interested. >> >> For short term mitigation of the Meltdown issue on 4.4 with PV domains, >> your best bet is probably to use the "Vixen" shim solution, which George >> has put into the xen-44 package repository per his email from two days >> ago. Vixen allows you to run PV domains inside HVM guest containers. It >> does not protect the guest from itself, but protects the domains from >> each other. Long term, your best bet is to try to get up to a new >> version of Xen that is under upstream security support, probably 4.8. >> > > Oracle VM 3.4 product is based on Xen 4.4, and they seem to have backported > the fixes already.. > > It looks like those src.rpms have {CVE-2017-5753} {CVE-2017-5715} > {CVE-2017-5754} fixes included. Example patch description: x86/cpuid: Offer Indirect Branch Controls to guests (Andrew Cooper) [Orabug: 27344753] {CVE-2017-5753} {CVE-2017-5715} {CVE-2017-5754} That patch, however, only has to do with 5715, not 5753 or 5754. It looks like it's tagged with "Orabug xxx", which covers all three variants, so their system automatically tags it with all three CVEs. It looks like they've taken an early version of the SP2 mitigation (which has been posted publicly), cleaned it up, and backported it (along with prerequisites). Official patches are still in progress. -George ___ CentOS-virt mailing list CentOS-virt@centos.org https://lists.centos.org/mailman/listinfo/centos-virt
Re: [CentOS-virt] Xen 4.4 Immediate EOL
On 19/01/18 17:58, Kevin Stange wrote: > On 01/19/2018 06:17 AM, Pasi Kärkkäinen wrote: >> On Thu, Jan 18, 2018 at 11:48:35AM -0600, Kevin Stange wrote: >>> Hi, >>> >> >> Hi, >> >>> I am very sorry to do this on short notice, but obviously Meltdown and >>> Spectre are a lot more than anyone was really expecting to come down the >>> pipeline. Xen 4.4 has been EOL upstream for about a year now and I have >>> personally been reviewing and backporting patches based on the 4.5 >>> versions made available upstream. >>> >>> Given that 4.5 is now also reaching EOL, backporting to 4.4 will become >>> harder and I've already taken steps to vacate 4.4 in my own environment >>> ASAP. Spectre and Meltdown patches most likely will only officially >>> reach 4.6 and are very complicated. Ultimately, I don't think this is a >>> constructive use of my time. Therefore, I will NOT be continuing to >>> provide updated Xen 4.4 builds any longer through CentOS Virt SIG. If >>> someone else would like to take on the job, you're welcome to try. Pop >>> by #centos-virt on Freenode to talk to us there if you're interested. >>> >>> For short term mitigation of the Meltdown issue on 4.4 with PV domains, >>> your best bet is probably to use the "Vixen" shim solution, which George >>> has put into the xen-44 package repository per his email from two days >>> ago. Vixen allows you to run PV domains inside HVM guest containers. It >>> does not protect the guest from itself, but protects the domains from >>> each other. Long term, your best bet is to try to get up to a new >>> version of Xen that is under upstream security support, probably 4.8. >> >> Oracle VM 3.4 product is based on Xen 4.4, and they seem to have backported >> the fixes already.. >> >> It looks like those src.rpms have {CVE-2017-5753} {CVE-2017-5715} >> {CVE-2017-5754} fixes included. >> >> https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/thread.html >> https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000816.html >> https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000817.html >> >> http://oss.oracle.com/oraclevm/server/3.4/SRPMS-updates/xen-4.4.4-155.0.12.el6.src.rpm >> http://oss.oracle.com/oraclevm/server/3.4/SRPMS-updates/xen-4.4.4-105.0.30.el6.src.rpm > > That's impressive but dubious as Xen has not released any fixes for > CVE-2017-5753 or CVE-2017-5715 even for 4.10 yet. > It's not that dubious since its mainly Konrad Wilk and Boris Ostrovsky that have been doing most of that :) OracleVM also has a grub2 backport although I haven't really looked at that. jch ___ CentOS-virt mailing list CentOS-virt@centos.org https://lists.centos.org/mailman/listinfo/centos-virt
Re: [CentOS-virt] Xen 4.4 Immediate EOL
On 01/19/2018 06:17 AM, Pasi Kärkkäinen wrote: > On Thu, Jan 18, 2018 at 11:48:35AM -0600, Kevin Stange wrote: >> Hi, >> > > Hi, > >> I am very sorry to do this on short notice, but obviously Meltdown and >> Spectre are a lot more than anyone was really expecting to come down the >> pipeline. Xen 4.4 has been EOL upstream for about a year now and I have >> personally been reviewing and backporting patches based on the 4.5 >> versions made available upstream. >> >> Given that 4.5 is now also reaching EOL, backporting to 4.4 will become >> harder and I've already taken steps to vacate 4.4 in my own environment >> ASAP. Spectre and Meltdown patches most likely will only officially >> reach 4.6 and are very complicated. Ultimately, I don't think this is a >> constructive use of my time. Therefore, I will NOT be continuing to >> provide updated Xen 4.4 builds any longer through CentOS Virt SIG. If >> someone else would like to take on the job, you're welcome to try. Pop >> by #centos-virt on Freenode to talk to us there if you're interested. >> >> For short term mitigation of the Meltdown issue on 4.4 with PV domains, >> your best bet is probably to use the "Vixen" shim solution, which George >> has put into the xen-44 package repository per his email from two days >> ago. Vixen allows you to run PV domains inside HVM guest containers. It >> does not protect the guest from itself, but protects the domains from >> each other. Long term, your best bet is to try to get up to a new >> version of Xen that is under upstream security support, probably 4.8. > > Oracle VM 3.4 product is based on Xen 4.4, and they seem to have backported > the fixes already.. > > It looks like those src.rpms have {CVE-2017-5753} {CVE-2017-5715} > {CVE-2017-5754} fixes included. > > https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/thread.html > https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000816.html > https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000817.html > > http://oss.oracle.com/oraclevm/server/3.4/SRPMS-updates/xen-4.4.4-155.0.12.el6.src.rpm > http://oss.oracle.com/oraclevm/server/3.4/SRPMS-updates/xen-4.4.4-105.0.30.el6.src.rpm That's impressive but dubious as Xen has not released any fixes for CVE-2017-5753 or CVE-2017-5715 even for 4.10 yet. -- Kevin Stange Chief Technology Officer Steadfast | Managed Infrastructure, Datacenter and Cloud Services 800 S Wells, Suite 190 | Chicago, IL 60607 312.602.2689 X203 | Fax: 312.602.2688 ke...@steadfast.net | www.steadfast.net ___ CentOS-virt mailing list CentOS-virt@centos.org https://lists.centos.org/mailman/listinfo/centos-virt