Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-05 Thread Paolo Bonzini
On 05/01/2018 11:40, Stefan Priebe - Profihost AG wrote: > Thanks! But it‘s very difficult to get all opinions all together. > > SuSE Enterprise told me to update: > - kernel > - qemu > - Intel microcode > > And the released already updates for all of them. Yes, but live migrate an updated

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-05 Thread Stefan Priebe - Profihost AG
Thanks! But it‘s very difficult to get all opinions all together. SuSE Enterprise told me to update: - kernel - qemu - Intel microcode And the released already updates for all of them. Stefan Excuse my typo sent from my mobile phone. > Am 05.01.2018 um 09:33 schrieb Paolo Bonzini

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-05 Thread Paolo Bonzini
On 04/01/2018 21:15, Stefan Priebe - Profihost AG wrote: > attached the relevant patch for everybody who needs it. This is the original patch from Intel, which doesn't work unless you have a patched kernel (which you almost certainly don't have) and doesn't even warn you about that. In other

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-04 Thread Stefan Priebe - Profihost AG
-devel" <qemu-devel@nongnu.org> >>> Envoyé: Jeudi 4 Janvier 2018 08:24:34 >>> Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches >>> >>>>> Can anybody point me to the relevant qemu patches? >>> >>> I don't have fin

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-04 Thread Paolo Bonzini
l original - >> De: "aderumier" <aderum...@odiso.com> >> À: "Stefan Priebe, Profihost AG" <s.pri...@profihost.ag> >> Cc: "qemu-devel" <qemu-devel@nongnu.org> >> Envoyé: Jeudi 4 Janvier 2018 08:24:34 >> Objet: Re: [Qe

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-04 Thread Stefan Priebe - Profihost AG
Nobody? Is this something they did on their own? Stefan Am 04.01.2018 um 07:27 schrieb Stefan Priebe - Profihost AG: > Hello, > > i've seen some vendors have updated qemu regarding meltdown / spectre. > > f.e.: > > CVE-2017-5715: QEMU was updated to allow passing through new MSR and >

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-04 Thread Stefan Priebe - Profihost AG
.@profihost.ag> > À: "aderumier" <aderum...@odiso.com> > Cc: "qemu-devel" <qemu-devel@nongnu.org> > Envoyé: Jeudi 4 Janvier 2018 09:17:41 > Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches > > Am 04.01.2018 um 08:27 schrieb Alexandr

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-04 Thread Alexandre DERUMIER
- Mail original - De: "Stefan Priebe, Profihost AG" <s.pri...@profihost.ag> À: "aderumier" <aderum...@odiso.com> Cc: "qemu-devel" <qemu-devel@nongnu.org> Envoyé: Jeudi 4 Janvier 2018 09:17:41 Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qem

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-04 Thread Stefan Priebe - Profihost AG
;qemu-devel@nongnu.org> > Envoyé: Jeudi 4 Janvier 2018 08:24:34 > Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches > >>> Can anybody point me to the relevant qemu patches? > > I don't have find them yet. > > Do you known if a vm using kvm64 cpu mode

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-03 Thread Alexandre DERUMIER
uot;Stefan Priebe, Profihost AG" <s.pri...@profihost.ag> Cc: "qemu-devel" <qemu-devel@nongnu.org> Envoyé: Jeudi 4 Janvier 2018 08:24:34 Objet: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches >>Can anybody point me to the relevant qemu patches? I don't

Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-03 Thread Alexandre DERUMIER
nongnu.org> Envoyé: Jeudi 4 Janvier 2018 07:27:01 Objet: [Qemu-devel] CVE-2017-5715: relevant qemu patches Hello, i've seen some vendors have updated qemu regarding meltdown / spectre. f.e.: CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from the host VM t

[Qemu-devel] CVE-2017-5715: relevant qemu patches

2018-01-03 Thread Stefan Priebe - Profihost AG
Hello, i've seen some vendors have updated qemu regarding meltdown / spectre. f.e.: CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from the host VM to the CPU, to allow enabling/disabling branch prediction features in the Intel CPU. (bsc#1068032)