[virt-tools-list] [virt-manager PATCH 0/5] CPU security features improvements

Peter Crowther peter.crowther at melandra.com
Thu Apr 4 09:00:21 UTC 2019


On Thu, 4 Apr 2019 at 09:15, Daniel P. Berrangé <berrange at redhat.com> wrote:

> On Wed, Apr 03, 2019 at 07:49:48PM -0400, Cole Robinson wrote:
> I
> think it is reasonable to assume that if the user has upgraded the
> microcode on some hosts they will have done it on all hosts.


Don't rely on it - certainly in the cases of the smaller organisations I
work with / audit, patching can be politely described as "haphazard".  Even
in the large public-sector organisations I work with, there's almost never
money for test rigs that have the same hardware as the live hosts.  It's
not uncommon for a live host to be the "guinea pig" receiving new microcode
before others, then returned to live service.

The real world is not tidy :-(.

If they
> have not upgraded on all hosts, I still think it is sensible to
> apply the security mitigations on the hosts which have been upgraded
> unless the user explicitly says to use the insecure mode.
>

Agree.

We should do the right thing out of the box to enable the
> security mitigations.  The fact that virt-intsall doesn't do this for
> named CPU models is arguably worthy of filing a CVE against virt-install
> itself.
>

Agree.

>
> Regards,
> Daniel
>

- Peter
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/virt-tools-list/attachments/20190404/8a96e582/attachment.htm>


More information about the virt-tools-list mailing list