[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-03-16 Thread Yuraeitha
On Friday, March 16, 2018 at 3:34:05 PM UTC+1, Lorenzo Lamas wrote: > After updating to Xen 4.6.6-37, with updated BIOS/microcode, I executed > Spectre & Meltdown > Checker(https://github.com/speed47/spectre-meltdown-checker) in a PV Fedora > 26 AppVM.(Kernel 4.14.18-1) > > Hardware support is

[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-03-16 Thread Yuraeitha
On Friday, March 16, 2018 at 3:34:05 PM UTC+1, Lorenzo Lamas wrote: > After updating to Xen 4.6.6-37, with updated BIOS/microcode, I executed > Spectre & Meltdown > Checker(https://github.com/speed47/spectre-meltdown-checker) in a PV Fedora > 26 AppVM.(Kernel 4.14.18-1) > > Hardware support is

[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-03-16 Thread Lorenzo Lamas
After updating to Xen 4.6.6-37, with updated BIOS/microcode, I executed Spectre & Meltdown Checker(https://github.com/speed47/spectre-meltdown-checker) in a PV Fedora 26 AppVM.(Kernel 4.14.18-1) Hardware support is now supported: * Hardware support (CPU microcode) for mitigation techniques * I

[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-08 Thread Vít Šesták
On Thursday, February 1, 2018 at 10:31:14 AM UTC+1, Vít Šesták wrote: > I have also seen one strange change (not sure about the timing, but it might > be related to the update) that might affect security of those who use some > pseudo-DVM for sys-usb. When I remove USB „mouse“* and attach it back

[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-01 Thread Vít Šesták
I have installed the patch from security-testing. On system resume, I sometimes notice effects like: * Time synced noticeably late. For example, when my laptop wakes up on morning, Thunderbird considers today's e-mails as e-mails from future day (so it displays date, not only time). * Some VMs

Re: [qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-24 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Jan 24, 2018 at 12:15:25PM -0700, Reg Tiangha wrote: > On 01/24/2018 07:51 AM, Ed wrote: > > On 01/24/2018 04:29 AM, Andrew David Wong wrote: > > > >> ## Qubes 3.2 > >> > >> Previously, we had planned to release an update for Qubes 3.2 that

[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-24 Thread Reg Tiangha
On 01/24/2018 07:51 AM, Ed wrote: > On 01/24/2018 04:29 AM, Andrew David Wong wrote: > >> ## Qubes 3.2 >> >> Previously, we had planned to release an update for Qubes 3.2 that would >> have made almost all VMs run in PVH mode by backporting support for this >> mode from Qubes 4.0. > > Out of cur

[qubes-users] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-24 Thread Ed
On 01/24/2018 04:29 AM, Andrew David Wong wrote: ## Qubes 3.2 Previously, we had planned to release an update for Qubes 3.2 that would have made almost all VMs run in PVH mode by backporting support for this mode from Qubes 4.0. Out of curiosity, is this still going to happen? I would love