On 05/01/2018 11:40, Stefan Priebe - Profihost AG wrote:
> Thanks! But it‘s very difficult to get all opinions all together.
>
> SuSE Enterprise told me to update:
> - kernel
> - qemu
> - Intel microcode
>
> And the released already updates for all of them.
Yes, but live migrate an updated
Thanks! But it‘s very difficult to get all opinions all together.
SuSE Enterprise told me to update:
- kernel
- qemu
- Intel microcode
And the released already updates for all of them.
Stefan
Excuse my typo sent from my mobile phone.
> Am 05.01.2018 um 09:33 schrieb Paolo Bonzini
On 04/01/2018 21:15, Stefan Priebe - Profihost AG wrote:
> attached the relevant patch for everybody who needs it.
This is the original patch from Intel, which doesn't work unless you
have a patched kernel (which you almost certainly don't have) and
doesn't even warn you about that.
In other
-devel" <qemu-devel@nongnu.org>
>>> Envoyé: Jeudi 4 Janvier 2018 08:24:34
>>> Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches
>>>
>>>>> Can anybody point me to the relevant qemu patches?
>>>
>>> I don't have fin
l original -
>> De: "aderumier" <aderum...@odiso.com>
>> À: "Stefan Priebe, Profihost AG" <s.pri...@profihost.ag>
>> Cc: "qemu-devel" <qemu-devel@nongnu.org>
>> Envoyé: Jeudi 4 Janvier 2018 08:24:34
>> Objet: Re: [Qe
Nobody? Is this something they did on their own?
Stefan
Am 04.01.2018 um 07:27 schrieb Stefan Priebe - Profihost AG:
> Hello,
>
> i've seen some vendors have updated qemu regarding meltdown / spectre.
>
> f.e.:
>
> CVE-2017-5715: QEMU was updated to allow passing through new MSR and
>
.@profihost.ag>
> À: "aderumier" <aderum...@odiso.com>
> Cc: "qemu-devel" <qemu-devel@nongnu.org>
> Envoyé: Jeudi 4 Janvier 2018 09:17:41
> Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches
>
> Am 04.01.2018 um 08:27 schrieb Alexandr
- Mail original -
De: "Stefan Priebe, Profihost AG" <s.pri...@profihost.ag>
À: "aderumier" <aderum...@odiso.com>
Cc: "qemu-devel" <qemu-devel@nongnu.org>
Envoyé: Jeudi 4 Janvier 2018 09:17:41
Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qem
;qemu-devel@nongnu.org>
> Envoyé: Jeudi 4 Janvier 2018 08:24:34
> Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches
>
>>> Can anybody point me to the relevant qemu patches?
>
> I don't have find them yet.
>
> Do you known if a vm using kvm64 cpu mode
uot;Stefan Priebe, Profihost AG" <s.pri...@profihost.ag>
Cc: "qemu-devel" <qemu-devel@nongnu.org>
Envoyé: Jeudi 4 Janvier 2018 08:24:34
Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches
>>Can anybody point me to the relevant qemu patches?
I don't
nongnu.org>
Envoyé: Jeudi 4 Janvier 2018 07:27:01
Objet: [Qemu-devel] CVE-2017-5715: relevant qemu patches
Hello,
i've seen some vendors have updated qemu regarding meltdown / spectre.
f.e.:
CVE-2017-5715: QEMU was updated to allow passing through new MSR and
CPUID flags from the host VM t
Hello,
i've seen some vendors have updated qemu regarding meltdown / spectre.
f.e.:
CVE-2017-5715: QEMU was updated to allow passing through new MSR and
CPUID flags from the host VM to the CPU, to allow enabling/disabling
branch prediction features in the Intel CPU. (bsc#1068032)
12 matches
Mail list logo