From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:39472) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1eWztK-0000az-3B for qemu-devel@nongnu.org; Thu, 04 Jan 2018 02:24:46 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1eWztG-0007ax-1o for qemu-devel@nongnu.org; Thu, 04 Jan 2018 02:24:42 -0500 Received: from mailpro.odiso.net ([89.248.211.110]:48188) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1eWztF-0007ae-R9 for qemu-devel@nongnu.org; Thu, 04 Jan 2018 02:24:37 -0500 Date: Thu, 4 Jan 2018 08:24:34 +0100 (CET) From: Alexandre DERUMIER Message-ID: <446087972.818501.1515050674109.JavaMail.zimbra@oxygem.tv> In-Reply-To: <6d95cc4b-155c-44cb-1fc0-18ba848741ac@profihost.ag> References: <6d95cc4b-155c-44cb-1fc0-18ba848741ac@profihost.ag> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [Qemu-devel] CVE-2017-5715: relevant qemu patches List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Stefan Priebe, Profihost AG" Cc: qemu-devel >>Can anybody point me to the relevant qemu patches?=20 I don't have find them yet. Do you known if a vm using kvm64 cpu model is protected or not ? ----- Mail original ----- De: "Stefan Priebe, Profihost AG" =C3=80: "qemu-devel" Envoy=C3=A9: Jeudi 4 Janvier 2018 07:27:01 Objet: [Qemu-devel] CVE-2017-5715: relevant qemu patches Hello,=20 i've seen some vendors have updated qemu regarding meltdown / spectre.=20 f.e.:=20 CVE-2017-5715: QEMU was updated to allow passing through new MSR and=20 CPUID flags from the host VM to the CPU, to allow enabling/disabling=20 branch prediction features in the Intel CPU. (bsc#1068032)=20 Can anybody point me to the relevant qemu patches?=20 Thanks!=20 Greets,=20 Stefan=20