
On Fri, Jun 29, 2018 at 11:19:17AM +0100, Daniel P. Berrangé wrote:
On Fri, Jun 29, 2018 at 09:53:53AM +0100, Dr. David Alan Gilbert wrote: [...]
We're going to have to say something like: 'For the new XYZ vulnerability make sure you're using Haswell-3.2 or later, SkyLake-2.6 or later, Westmere-4.8 or later .....'
which all gets a bit confusing.
The kernel has a /sys/devices/system/cpu/vulnerabilities dir that lists status of various flaws.
I have been thinking about whether libvirt should create a 'virt-guest-validate' command that looks at guest XML and reports whether any of the config settings are vulnerable or otherwise diverging from best practice in some way.
QEMU itself would perhaps have a 'query-vulnerabilities' monitor command to report whether the current config is satisfactory or not.
Makes sense to me. I wanted to make QEMU emit warnings on obviously insecure configurations. Adding a query-vulnerabilities command would be the QMP counterpart of that. -- Eduardo