From: Paolo Bonzini <pbonzini@redhat.com>
To: "Daniel P. Berrangé" <berrange@redhat.com>, qemu-devel@nongnu.org
Cc: Prasad J Pandit <pjp@fedoraproject.org>, Thomas Huth <thuth@redhat.com>
Subject: Re: [Qemu-devel] [web PATCH 0/4] Add web section reporting information about CVEs in QEMU
Date: Thu, 18 Oct 2018 23:36:39 +0200 [thread overview]
Message-ID: <c11576e1-9644-66e7-7dc6-b9d0ee4b537f@redhat.com> (raw)
In-Reply-To: <20181018145203.11336-1-berrange@redhat.com>
On 18/10/2018 16:51, Daniel P. Berrangé wrote:
>
> After adding the new $YEAR/$ID.xml file, 'make' will build the
> corresponding indexes and HTML/TXT renderings. Ideally the machine which
> is hosting the QEMU website would run 'make' after pulling new
> commits. In this series, however, I have just commited the rendered
> content to git.
"git push" is already running Jekyll, which has a templating mechanism
similar to the one used for blog posts
(https://jekyllrb.com/docs/collections/). Basically one security notice
would be a file in a _secnotices directory, with the metadata in a YAML
preamble like this:
---
title: Speculative store bypass
id: 2018-001
date: 2018-05-21
reported: 2018-03-12
fixed: 2018-06-26
credits:
- reporter:
- name: Ken Johnson (Microsoft Security Response Center)
- name: Jann Horn (Google Project Zero)
- patcher:
- name: Daniel P. Berrangé
email: berrange@redhat.com
- name: Konrad Rzeszutek Wilk
email: konrad.wilk@oracle.com
advisories:
- type: CVE
id: 2018-3639
branches:
- master:
state: fixed
change:
- d19d1f965904a533998739698020ff4ee8a103da: fixed
- 403503b162ffc33fb64cfefdf7b880acf41772cd: fixed
- 4f50c1673a89b07f376ce5c42d22d79a79cd466d: merged
- a764f3f7197f4d7ad8fe8424269933de912224cb: fixed
- e409d9a158c77c650651e8118f6c86c8dc76eba6: merged
- 7ba1e61953f4592606e60b2e7507ff6a6faf861a: vulnerable
tag:
- v0.10.1: vulnerable
...
+---
{% contentfor description %}
An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of Load & Store
instructions (a commonly used performance optimization).
+
+It relies on the presence of a precisely-defined instruction sequence
in the privileged code as well as the fact that memory read from address
to which a recent memory write has occurred may see an older value and
subsequently cause an update into the microprocessor's data cache even
for speculatively executed instructions that never actually commit (retire).
{% endcontentfor %}
{% contentfor impact %}
As a result, an unprivileged attacker could use this flaw to read
privileged memory by conducting targeted cache side-channel attacks.
{% endcontentfor %}
{% contentfor mitigation %}
None
{% endcontentfor %}
(Requires the jekyll-contentblocks plugin).
I am not a YAML fan, but I still would probably have to hide if I
suggested using XSLT to convert the XML files to YAML. :) Still, one
question is obvious: is the XML an industry standard? That would make
it more palatable...
next prev parent reply other threads:[~2018-10-18 21:36 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-10-18 14:51 [Qemu-devel] [web PATCH 0/4] Add web section reporting information about CVEs in QEMU Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 1/4] Underline the current page section Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 2/4] Introduce content and tools for managing security notices Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 3/4] Add vulnerability reports for 2018 Daniel P. Berrangé
2018-10-18 14:52 ` [Qemu-devel] [web PATCH 4/4] Update pre-rendered content Daniel P. Berrangé
2018-10-18 21:36 ` Paolo Bonzini [this message]
2018-10-19 10:25 ` [Qemu-devel] [web PATCH 0/4] Add web section reporting information about CVEs in QEMU Daniel P. Berrangé
2018-10-19 12:08 ` Paolo Bonzini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c11576e1-9644-66e7-7dc6-b9d0ee4b537f@redhat.com \
--to=pbonzini@redhat.com \
--cc=berrange@redhat.com \
--cc=pjp@fedoraproject.org \
--cc=qemu-devel@nongnu.org \
--cc=thuth@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).