Oh so you seem to have a combination of HW/FW/Kernel that gets along with it. 
But for e.g. a Hosting environment please be aware of the "SMT vulnerable" 
unless you don't have SMT disabled anyway.
Since different systems (HW/FW/Kernel) will behave differently I think this 
issue isn't resolved yet @Nobuto.


@Security please let us know what your plan is on that - backporting the named 
types with the features removed to qemu/libvirt or did this change overall.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853200

Title:
  cpu features hle and rtm disabled for security are present in
  /usr/share/libvirt/cpu_map.xml

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1853200/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to