qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: "Daniel P. Berrangé" <berrange@redhat.com>, qemu-devel@nongnu.org
Cc: Prasad J Pandit <pjp@fedoraproject.org>, Thomas Huth <thuth@redhat.com>
Subject: Re: [Qemu-devel] [web PATCH 0/4] Add web section reporting information about CVEs in QEMU
Date: Thu, 18 Oct 2018 23:36:39 +0200	[thread overview]
Message-ID: <c11576e1-9644-66e7-7dc6-b9d0ee4b537f@redhat.com> (raw)
In-Reply-To: <20181018145203.11336-1-berrange@redhat.com>

On 18/10/2018 16:51, Daniel P. Berrangé wrote:
> 
> After adding the new $YEAR/$ID.xml file, 'make' will build the
> corresponding indexes and HTML/TXT renderings. Ideally the machine which
> is hosting the QEMU website would run 'make' after pulling new
> commits. In this series, however, I have just commited the rendered
> content to git.

"git push" is already running Jekyll, which has a templating mechanism
similar to the one used for blog posts
(https://jekyllrb.com/docs/collections/).  Basically one security notice
would be a file in a _secnotices directory, with the metadata in a YAML
preamble like this:

---
title: Speculative store bypass
id: 2018-001
date: 2018-05-21
reported: 2018-03-12
fixed: 2018-06-26

credits:
  - reporter:
    - name: Ken Johnson (Microsoft Security Response Center)
    - name: Jann Horn (Google Project Zero)
  - patcher:
    - name: Daniel P. Berrangé
      email: berrange@redhat.com
    - name: Konrad Rzeszutek Wilk
      email: konrad.wilk@oracle.com

advisories:
  - type: CVE
    id: 2018-3639

branches:
  - master:
      state: fixed
      change:
      - d19d1f965904a533998739698020ff4ee8a103da: fixed
      - 403503b162ffc33fb64cfefdf7b880acf41772cd: fixed
      - 4f50c1673a89b07f376ce5c42d22d79a79cd466d: merged
      - a764f3f7197f4d7ad8fe8424269933de912224cb: fixed
      - e409d9a158c77c650651e8118f6c86c8dc76eba6: merged
      - 7ba1e61953f4592606e60b2e7507ff6a6faf861a: vulnerable
      tag:
      - v0.10.1: vulnerable
    ...
+---

{% contentfor description %}
An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of Load & Store
instructions (a commonly used performance optimization).
+
+It relies on the presence of a precisely-defined instruction sequence
in the privileged code as well as the fact that memory read from address
to which a recent memory write has occurred may see an older value and
subsequently cause an update into the microprocessor's data cache even
for speculatively executed instructions that never actually commit (retire).
{% endcontentfor %}

{% contentfor impact %}
As a result, an unprivileged attacker could use this flaw to read
privileged memory by conducting targeted cache side-channel attacks.
{% endcontentfor %}

{% contentfor mitigation %}
None
{% endcontentfor %}


(Requires the jekyll-contentblocks plugin).

I am not a YAML fan, but I still would probably have to hide if I
suggested using XSLT to convert the XML files to YAML. :)  Still, one
question is obvious: is the XML an industry standard?  That would make
it more palatable...

  parent reply	other threads:[~2018-10-18 21:36 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-10-18 14:51 [Qemu-devel] [web PATCH 0/4] Add web section reporting information about CVEs in QEMU Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 1/4] Underline the current page section Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 2/4] Introduce content and tools for managing security notices Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 3/4] Add vulnerability reports for 2018 Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 4/4] Update pre-rendered content Daniel P. Berrangé
2018-10-18 21:36 ` Paolo Bonzini [this message]
2018-10-19 10:25   ` [Qemu-devel] [web PATCH 0/4] Add web section reporting information about CVEs in QEMU Daniel P. Berrangé
2018-10-19 12:08     ` Paolo Bonzini

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c11576e1-9644-66e7-7dc6-b9d0ee4b537f@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=berrange@redhat.com \
    --cc=pjp@fedoraproject.org \
    --cc=qemu-devel@nongnu.org \
    --cc=thuth@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).