XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng Security Bulletin: MDS hardware vulnerabilities in Intel CPUs

    Scheduled Pinned Locked Moved News
    10 Posts 3 Posters 1.2k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stormiS Offline
      stormi Vates πŸͺ XCP-ng Team
      last edited by stormi

      Latest XCP-ng security bulletin, dedicated to the recently discovered MDS attacks on Intel CPUs. Update available but also requires extra steps for full mitigation.

      Full story here: https://xcp-ng.org/blog/2019/05/21/xcp-ng-security-bulletin-mds-hardware-vulnerabilities-in-intel-cpus/

      Raise your hands if you're still using XCP-ng 7.5 and badly need an update. As you know, we try to support the N-1 release of XCP-ng on a best-effort basis, but backporting the fixes may not be trivial, and 7.5 is very close from end of support from us with the upcoming release of XCP-ng 8.0.

      1 Reply Last reply Reply Quote 0
      • stormiS Offline
        stormi Vates πŸͺ XCP-ng Team
        last edited by

        No one raised their hands, and yet an update candidate for 7.5 is available with the fixes backported from 7.6.

        Install it with

        yum update --enablerepo='xcp-ng-updates_testing' microcode_ctl xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools
        

        We've tested it locally, works fine for us.

        1 Reply Last reply Reply Quote 2
        • stormiS Offline
          stormi Vates πŸͺ XCP-ng Team
          last edited by stormi

          Intel has released updated microcode that I'm considering including in XCP-ng 8.0 and 7.6.

          The main interesting thing is that it brings MDS attacks mitigation for the SandyBridge family of CPUs. But I also need feedback from people who'd install the new microcode on CPUs that already got the mitigation with the previous microcode update so they can report if everything still goes well (especialy check, after a reboot, that xl dmesg | grep "Hardware features:" contains MD_CLEAR).

          To install the update:

          • on XCP-ng 7.6: yum update microcode_ctl --enablerepo='xcp-ng-updates_testing'
          • on XCP-ng 8.0: yum update microcode_ctl --enablerepo='xcp-ng-testing'

          To revert to the previous version:

          • on both: yum downgrade microcode_ctl
          borzelB 2 Replies Last reply Reply Quote 1
          • borzelB Offline
            borzel XCP-ng Center Team @stormi
            last edited by borzel

            stormi I used this script to check: https://github.com/speed47/spectre-meltdown-checker
            Maybe we should include it in the XCP-ng repo?

            olivierlambert the output of this script could maybe be displayed in XO, this would be a uniqe feature πŸ™‚

            1 Reply Last reply Reply Quote 0
            • olivierlambertO Online
              olivierlambert Vates πŸͺ Co-Founder CEO
              last edited by

              I can say that's not trivial, because there is multiple levels: Xen, the host, and the VMs. To know if you are fully protected is far from being a simple story… As you might noted, just knowing if you have HT enabled is very complicated.

              borzelB 1 Reply Last reply Reply Quote 0
              • borzelB Offline
                borzel XCP-ng Center Team @olivierlambert
                last edited by

                olivierlambert I know πŸ˜• 😞 just saw the json like output of the script and had this idea πŸ™‚

                1 Reply Last reply Reply Quote 0
                • borzelB Offline
                  borzel XCP-ng Center Team @stormi
                  last edited by borzel

                  stormi

                  I did the update, the XCP-ng 7.6 bootet πŸ™‚ but my testhost has no MD_CLEAR

                  • Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
                  • (from xl dmesg) microcode: CPU0 updated from revision 0x14 to 0x1f, date = 2018-05-08
                  stormiS 1 Reply Last reply Reply Quote 0
                  • stormiS Offline
                    stormi Vates πŸͺ XCP-ng Team @borzel
                    last edited by

                    borzel What CPU family is it?

                    borzelB 1 Reply Last reply Reply Quote 0
                    • borzelB Offline
                      borzel XCP-ng Center Team @stormi
                      last edited by

                      stormi https://ark.intel.com/content/www/de/de/ark/products/47925/intel-xeon-processor-e5620-12m-cache-2-40-ghz-5-86-gt-s-intel-qpi.html

                      Not SandyBridge

                      1 Reply Last reply Reply Quote 0
                      • borzelB Offline
                        borzel XCP-ng Center Team
                        last edited by borzel

                        Testhost at home updated

                        • XCP-ng 8.0 beta
                        • CPU: i5-4430 (Haswell) https://ark.intel.com/content/www/de/de/ark/products/75036/intel-core-i5-4430-processor-6m-cache-up-to-3-20-ghz.html
                        • (XEN) [ 0.000000] Hardware features: IBRS/IBPB STIBP L1D_FLUSH SSBD MD_CLEAR

                        Host started just fine, Win10 VM startetd also.

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post