Hi Brad!

Thanks for pointing out that for CentOS 6 the fix is included! Good to know that!

But I think that the original package doesn't support RBD by default so it has to be built again, am I right?

If that's correct then starting from there and building a new RPM with RBD support is the proper way of updating. Correct?

Since I am very new at building RPMs is something else that I should be aware of or take care? Any guidelines maybe....

Best regards,

George

On Thu, 21 May 2015 09:25:32 +1000, Brad Hubbard wrote:
On 05/21/2015 08:47 AM, Brad Hubbard wrote:
On 05/20/2015 11:02 AM, Robert LeBlanc wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

I've downloaded the new tarball, placed it in rpmbuild/SOURCES then
with the extracted spec file in rpmbuild/SPEC, I update it to the new
version and then rpmbuild -ba program.spec. If you install the SRPM
then it will install the RH patches that have been applied to the
package and then you get to have the fun of figuring out which patches are still needed and which ones need to be modified. You can probably
build the package without the patches, but some things may work a
little differently. That would get you the closest to the official
RPMs

As to where to find the SRPMs, I'm not really sure, I come from a
Debian background where access to source packages is really easy.


# yumdownloader --source qemu-kvm --source qemu-kvm-rhev

This assumes you have the correct source repos enabled. Something like;

# subscription-manager repos --enable=rhel-7-server-openstack-6.0-source-rpms --enable=rhel-7-server-source-rpms

Taken from https://access.redhat.com/solutions/1381603

Of course the above is for RHEL only and is unnecessary as there are errata packages for rhel. I was just trying to explain how you can get access to the
source packages for rhel.

As for Centos 6, although the version number may be "small" it has the fix.


http://vault.centos.org/6.6/updates/Source/SPackages/qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm

$ rpm -qp --changelog qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm |head -5
warning: qemu-kvm-0.12.1.2-2.448.el6_6.3.src.rpm: Header V3 RSA/SHA1
Signature, key ID c105b9de: NOKEY
* Fri May 08 2015 Miroslav Rezanina <mreza...@redhat.com> -
0.12.1.2-2.448.el6_6.3
- kvm-fdc-force-the-fifo-access-to-be-in-bounds-of-the-all.patch [bz#1219267]
- Resolves: bz#1219267
  (EMBARGOED CVE-2015-3456 qemu-kvm: qemu: floppy disk controller
flaw [rhel-6.6.z])

HTH.


Cheers,
Brad


HTH.

Cheers,
Brad

- ----------------
Robert LeBlanc
GPG Fingerprint 79A2 9CA4 6CC4 45DD A904  C70E E654 3BB2 FA62 B9F1


On Tue, May 19, 2015 at 3:47 PM, Georgios Dimitrakakis  wrote:
Erik,

are you talking about the ones here :

http://ftp.redhat.com/redhat/linux/enterprise/6Server/en/RHEV/SRPMS/ ???

 From what I see the version is rather "small" 0.12.1.2-2.448

How one can verify that it has been patched against venom vulnerability?

Additionally I only see the qemu-kvm package and not the qemu-img. Is it essential to update both in order to have a working CentOS system or can I
just proceed with the qemu-kvm?

Robert, any ideas where can I find the latest and patched SRPMs...I have been building v.2.3.0 from source but I am very reluctant to use it in my
system :-)

Best,

George


You can also just fetch the rhev SRPMs and build those. They have
rbd enabled already.
On May 19, 2015 12:31 PM, "Robert LeBlanc"  wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

You should be able to get the SRPM, extract the SPEC file and use
that
to build a new package. You should be able to tweak all the compile
options as well. Im still really new to building/rebuilding RPMs
but
Ive been able to do this for a couple of packages.
- ----------------
Robert LeBlanc
GPG Fingerprint 79A2 9CA4 6CC4 45DD A904 C70E E654 3BB2 FA62 B9F1

On Tue, May 19, 2015 at 12:33 PM, Georgios Dimitrakakis  wrote:
I am trying to build the packages manually and I was wondering
is the flag --enable-rbd enough to have full Ceph functionality?

Does anybody know what else flags should I include in order to
have the same
functionality as the original CentOS package plus the RBD
support?

Regards,

George


On Tue, 19 May 2015 13:45:50 +0300, Georgios Dimitrakakis wrote:

Hi!

The QEMU Venom vulnerability (http://venom.crowdstrike.com/ [1])
got my
attention and I would
like to know what are you people doing in order to have the
latest
patched QEMU version
working with Ceph RBD?

In my case I am using the qemu-img and qemu-kvm packages
provided by
Ceph (http://ceph.com/packages/ceph-extras/rpm/centos6/x86_64/
[2]) in
order to have RBD working on CentOS6 since the default
repository
packages do not work!

If I want to update to the latest QEMU packages which ones are
known
to work with Ceph RBD?
I have seen some people mentioning that Fedora packages are
working
but I am not sure if they have the latest packages available and
if
they are going to work eventually.

Is building manually the QEMU packages the only way???


Best regards,


George
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com [3]
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com [4]

_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com [5]
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com [6]

-----BEGIN PGP SIGNATURE-----
Version: Mailvelope v0.13.1
Comment: https://www.mailvelope.com [7]
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=SsM2
-----END PGP SIGNATURE-----
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com [8]
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com [9]



Links:
------
[1] http://venom.crowdstrike.com/
[2] http://ceph.com/packages/ceph-extras/rpm/centos6/x86_64/
[3] mailto:ceph-users@lists.ceph.com
[4] http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
[5] mailto:ceph-users@lists.ceph.com
[6] http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
[7] https://www.mailvelope.com
[8] mailto:ceph-users@lists.ceph.com
[9] http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
[10] mailto:rob...@leblancnet.us
-----BEGIN PGP SIGNATURE-----
Version: Mailvelope v0.13.1
Comment: https://www.mailvelope.com

wsFcBAEBCAAQBQJVW90yCRDmVDuy+mK58QAAQlIP/0MOK1vIHg4tojDfyv2/
NBoYqHRM+9EaxgvwZJtCRvJVkOIB9b6Np6HxU0ynaVoi3DDTuYh7OLzcTkys
d6o7nuf1KFm6XMw4hWYqSr78XW144VIwVuW86Bt+O/65trdztlFs9zFILGGg
/E5R6FBew9NbKHjMNE9gL2WYoz9bnVJ++ZETeq2r3tDNezFrX4yXH7qzse1B
MDkeXg0N2ImpVa4AKWRdeHCxMU9/HdYSOtV0pmkwoSVwuGrR9LCvn6+atDRI
s2hdGl8Pfd43GPLBNQr31CgP8vW4iEy0PnDH05+5g7Rd9KaeR2vJ1lexpp8o
jmMOOxv0749GmV9a3Elk5K9OZNbfvHjTaKYOhBW3iMV/Zd11W9kffVPNPKrF
YBYpGaPuUG+pcsaXOIpNh/AoU8A8lROaQpCWaFg35y0YUjx+Xq6OIWgJTi+B
BdLFrsZn6ed8QxICFiltzX+M7fBESga0rt+AtsRFZtVA9g/I3XZX+rRh9cTx
MrK6R9UmbAx6+eJQ+0KuOs4/yhdWKvOMUSYsX9k4R9zsy6wS3sYt0eNdMXkW
VPmFcWGxFhFDcCfqSvu9T56+0aZabVNRlp4XR9m0ZEa0ngL3F+FwnlEMT9hF
VvCGWkzsde2BzgWQuTCVQJqK+D8urOzYFF/7kFtw6Ld0Ao62GczDmqn4HJAL
9cbM
=Mi5q
-----END PGP SIGNATURE-----
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com


_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

--
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to