On Mon, May 21, 2018 at 11:05:06PM +0100, Daniel P. Berrangé wrote:
This provides the libvirt part of the mitigations for the
speculative
store buffer bypass vulnerabilities on the x86 platform[1], and is
the companion of the kernel patches merged in:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit...
And QEMU patches posted at
https://lists.gnu.org/archive/html/qemu-devel/2018-05/msg04795.html
[1]
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://access.redhat.com/security/vulnerabilities/ssbd
Daniel P. Berrangé (2):
cpu: define the 'ssbd' CPUID feature bit (CVE-2018-3639)
cpu: define the 'virt-ssbd' CPUID feature bit (CVE-2018-3639)
src/cpu/cpu_map.xml | 6 ++++++
1 file changed, 6 insertions(+)
Both changes:
Reveiwed-by: Kashyap Chamarthy <kchamart(a)redhat.com>
--
/kashyap