Bug 1519780 (CVE-2017-5715)

Summary: CVE-2017-5715 hw: cpu: speculative execution branch target injection
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: admin, airlied, ajax, apevec, apmukher, aquini, areis, berrange, bhu, blc, bmcclain, bskeggs, ccui, chrisw, cperry, crobinso, cvsbot-xmlrpc, cye, danken, dblechte, dfediuck, dhoward, dominik.mierzejewski, dougsland, dracut-maint-list, dvlasenk, eblake, eedri, esammons, ewk, fadamo, fhrbata, gmollett, gnaik, hannsj_uhl, haoqf, hdegoede, herrold, hkrzesin, hwkernel-mgr, iboverma, ichavero, itamar, jarodwilson, jbastian, jdenemar, jen, jforbes, jglisse, jjoyce, jkacur, jkastner, joe, john.j5live, jonathan, jon.dufresne, jonte.regnell, josef, jpriddy, jross, jrusnack, jschluet, jstancek, jsuchane, jwboyer, kbasil, kernel-maint, kernel-mgr, klaas, knoel, kraxel, labbott, lersek, lgoncalv, lhh, libvirt-maint, linville, liwan, lpeer, lsurette, lwang, markmc, matt, mburns, mchehab, mcressma, mgoldboi, mguzik, michal.skrivanek, mjg59, mkenneth, mlangsdo, mmilgram, mpoole, mrezanin, mst, nmurray, pbonzini, pbrobinson, pkrempa, plougher, pmatouse, poros, ppandit, pstehlik, qguo, rbalakri, rbarry, rbryant, rcain, rvrbovsk, sbonazzo, sclewis, security-response-team, sherold, skozina, slawomir, slinaber, srevivo, steved, tdecacqu, ubellavance, vcojot, victor.melnichenko, virt-maint, wainersm, williams, ycui, ykaul, ykopkova, ylavi, yozone, yturgema, zhijwang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=important,public=20180103:2200,reported=20171130,source=google,cvss3=5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N,cwe=CWE-200,rhel-7/kernel=affected,rhel-6/kernel=affected,rhel-6/qemu-kvm=affected,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,rhel-6/libvirt=affected,rhel-7/libvirt=affected,rhel-7/linux-firmware=affected,rhel-6/microcode_ctl=affected,rhel-7/microcode_ctl=affected,openstack-6/qemu-kvm-rhev=affected,openstack-7/qemu-kvm-rhev=affected,openstack-8/qemu-kvm-rhev=affected,openstack-9/qemu-kvm-rhev=affected,openstack-10/qemu-kvm-rhev=affected,openstack-11/qemu-kvm-rhev=affected,openstack-12/qemu-kvm-rhev=affected,rhev-m-4/vdsm=affected,rhev-m-4/rhevm-setup-plugins=affected,rhev-m-4/rhev-hypervisor=affected,rhev-m-4/ovirt-guest-agent-docker=affected,rhev-m-3/vdsm=affected,rhev-m-3/rhevm-setup-plugins=affected,rhev-m-3/rhev-hypervisor=affected,rhel-5/microcode_ctl=affected,rhev-m-4/rhevm-appliance=affected,rhel-alt-7/qemu-kvm=affected,rhel-alt-7/qemu-kvm-ma=affected,rhel-6/qemu-kvm-rhev=affected,rhel-7/kernel-rt=affected,mrg-2/kernel-rt=affected,rhev-m-3/rhev-hypervisor-ng=affected,rhel-7/dracut=affected,fedora-all/kernel=affected,fedora-all/arm-trusted-firmware=affected,rhel-5/kernel=affected,rhel-alt-7/kernel-alt=affected,rhel-7/ovmf=notaffected,rhel-8/edk2=notaffected
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.
Story Points: ---
Clone Of: CVE-2017-5753
: CVE-2017-5754, Meltdown (view as bug list) Environment:
Last Closed: 2018-05-28 14:00:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 1526982, 1532114, 1476039, 1519795, 1519796, 1519797, 1519798, 1525939, 1525940, 1525942, 1525943, 1525944, 1525945, 1525946, 1525947, 1525948, 1525949, 1526943, 1526974, 1526975, 1526976, 1526977, 1526978, 1526979, 1526980, 1526981, 1526983, 1526984, 1526985, 1526986, 1526987, 1526988, 1526989, 1526990, 1526991, 1526992, 1526993, 1526994, 1526995, 1526996, 1527310, 1527311, 1527340, 1527341, 1527342, 1527343, 1527351, 1527352, 1527353, 1527354, 1527355, 1527356, 1527357, 1527358, 1527359, 1527360, 1527361, 1527463, 1527467, 1527468, 1527469, 1527470, 1527471, 1527472, 1527549, 1527550, 1527601, 1527603, 1527863, 1527864, 1527865, 1527913, 1527914, 1527919, 1527931, 1527932, 1528023, 1528024, 1528285, 1528286, 1528287, 1528623, 1529308, 1529309, 1529310, 1529311, 1530827, 1532113, 1532117, 1532118, 1532143, 1532733, 1532734, 1533626, 1533627, 1537188, 1538542, 1542084, 1542085    
Bug Blocks: 1516900    

Description Petr Matousek 2017-12-01 12:59:35 UTC
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.

Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.

Comment 22 Petr Matousek 2018-01-03 19:29:05 UTC
Acknowledgments:

Name: Google Project Zero

Comment 23 Petr Matousek 2018-01-03 19:29:14 UTC
Statement:

Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution

Comment 25 Petr Matousek 2018-01-03 22:55:08 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1530827]

Comment 27 errata-xmlrpc 2018-01-03 23:17:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support

Via RHSA-2018:0010 https://access.redhat.com/errata/RHSA-2018:0010

Comment 28 errata-xmlrpc 2018-01-04 00:04:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0009 https://access.redhat.com/errata/RHSA-2018:0009

Comment 29 errata-xmlrpc 2018-01-04 00:18:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.7 Extended Update Support

Via RHSA-2018:0011 https://access.redhat.com/errata/RHSA-2018:0011

Comment 30 errata-xmlrpc 2018-01-04 00:40:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0007 https://access.redhat.com/errata/RHSA-2018:0007

Comment 31 errata-xmlrpc 2018-01-04 00:44:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0008 https://access.redhat.com/errata/RHSA-2018:0008

Comment 32 errata-xmlrpc 2018-01-04 00:46:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0012 https://access.redhat.com/errata/RHSA-2018:0012

Comment 33 errata-xmlrpc 2018-01-04 00:59:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0013 https://access.redhat.com/errata/RHSA-2018:0013

Comment 34 errata-xmlrpc 2018-01-04 04:48:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0015 https://access.redhat.com/errata/RHSA-2018:0015

Comment 35 errata-xmlrpc 2018-01-04 05:00:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0014 https://access.redhat.com/errata/RHSA-2018:0014

Comment 36 errata-xmlrpc 2018-01-04 05:50:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0016 https://access.redhat.com/errata/RHSA-2018:0016

Comment 37 errata-xmlrpc 2018-01-04 05:52:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support

Via RHSA-2018:0017 https://access.redhat.com/errata/RHSA-2018:0017

Comment 38 errata-xmlrpc 2018-01-04 13:07:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2018:0018 https://access.redhat.com/errata/RHSA-2018:0018

Comment 39 errata-xmlrpc 2018-01-04 16:53:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2018:0020 https://access.redhat.com/errata/RHSA-2018:0020

Comment 40 errata-xmlrpc 2018-01-04 16:56:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2018:0021 https://access.redhat.com/errata/RHSA-2018:0021

Comment 41 errata-xmlrpc 2018-01-04 16:58:11 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2018:0025 https://access.redhat.com/errata/RHSA-2018:0025

Comment 42 errata-xmlrpc 2018-01-04 16:59:37 UTC
This issue has been addressed in the following products:

  RHEV 3.X Hypervisor and Agents for RHEL-7 ELS

Via RHSA-2018:0028 https://access.redhat.com/errata/RHSA-2018:0028

Comment 43 errata-xmlrpc 2018-01-04 17:02:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0023 https://access.redhat.com/errata/RHSA-2018:0023

Comment 44 errata-xmlrpc 2018-01-04 17:04:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support

Via RHSA-2018:0026 https://access.redhat.com/errata/RHSA-2018:0026

Comment 45 errata-xmlrpc 2018-01-04 17:06:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 Advanced Update Support

Via RHSA-2018:0022 https://access.redhat.com/errata/RHSA-2018:0022

Comment 46 errata-xmlrpc 2018-01-04 17:09:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0024 https://access.redhat.com/errata/RHSA-2018:0024

Comment 47 errata-xmlrpc 2018-01-04 17:10:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0027 https://access.redhat.com/errata/RHSA-2018:0027

Comment 48 errata-xmlrpc 2018-01-04 18:29:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support

Via RHSA-2018:0032 https://access.redhat.com/errata/RHSA-2018:0032

Comment 49 errata-xmlrpc 2018-01-04 18:32:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0030 https://access.redhat.com/errata/RHSA-2018:0030

Comment 50 errata-xmlrpc 2018-01-04 18:49:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0031 https://access.redhat.com/errata/RHSA-2018:0031

Comment 51 errata-xmlrpc 2018-01-04 18:54:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support

Via RHSA-2018:0035 https://access.redhat.com/errata/RHSA-2018:0035

Comment 52 errata-xmlrpc 2018-01-04 18:57:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2018:0039 https://access.redhat.com/errata/RHSA-2018:0039

Comment 53 errata-xmlrpc 2018-01-04 19:00:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2018:0038 https://access.redhat.com/errata/RHSA-2018:0038

Comment 54 errata-xmlrpc 2018-01-04 19:02:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0034 https://access.redhat.com/errata/RHSA-2018:0034

Comment 55 errata-xmlrpc 2018-01-04 19:03:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support

Via RHSA-2018:0037 https://access.redhat.com/errata/RHSA-2018:0037

Comment 56 errata-xmlrpc 2018-01-04 19:06:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.7 Extended Update Support

Via RHSA-2018:0036 https://access.redhat.com/errata/RHSA-2018:0036

Comment 57 errata-xmlrpc 2018-01-04 21:52:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0029 https://access.redhat.com/errata/RHSA-2018:0029

Comment 58 errata-xmlrpc 2018-01-04 22:18:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 Advanced Update Support

Via RHSA-2018:0040 https://access.redhat.com/errata/RHSA-2018:0040

Comment 60 errata-xmlrpc 2018-01-05 15:47:52 UTC
This issue has been addressed in the following products:

  RHEV 3.X Hypervisor and Agents for RHEL-7 ELS

Via RHSA-2018:0048 https://access.redhat.com/errata/RHSA-2018:0048

Comment 61 errata-xmlrpc 2018-01-05 15:50:15 UTC
This issue has been addressed in the following products:

  RHEV 3.X Hypervisor and Agents for RHEL-6
  RHEV 3.X Hypervisor and Agents for RHEL-7 ELS

Via RHSA-2018:0046 https://access.redhat.com/errata/RHSA-2018:0046

Comment 62 errata-xmlrpc 2018-01-05 15:53:03 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2018:0047 https://access.redhat.com/errata/RHSA-2018:0047

Comment 63 errata-xmlrpc 2018-01-05 15:54:54 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2018:0050 https://access.redhat.com/errata/RHSA-2018:0050

Comment 64 errata-xmlrpc 2018-01-05 15:58:26 UTC
This issue has been addressed in the following products:

  RHEV 3.X Hypervisor and Agents for RHEL-7

Via RHSA-2018:0044 https://access.redhat.com/errata/RHSA-2018:0044

Comment 65 errata-xmlrpc 2018-01-05 16:02:27 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2018:0049 https://access.redhat.com/errata/RHSA-2018:0049

Comment 66 errata-xmlrpc 2018-01-05 16:03:58 UTC
This issue has been addressed in the following products:

  RHEV Manager version 3.6

Via RHSA-2018:0052 https://access.redhat.com/errata/RHSA-2018:0052

Comment 67 errata-xmlrpc 2018-01-05 16:05:26 UTC
This issue has been addressed in the following products:

  RHEV Engine version 4.1

Via RHSA-2018:0051 https://access.redhat.com/errata/RHSA-2018:0051

Comment 68 errata-xmlrpc 2018-01-05 16:07:13 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2018:0045 https://access.redhat.com/errata/RHSA-2018:0045

Comment 69 errata-xmlrpc 2018-01-05 17:17:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support

Via RHSA-2018:0053 https://access.redhat.com/errata/RHSA-2018:0053

Comment 70 errata-xmlrpc 2018-01-05 18:25:12 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 8.0 (Liberty)

Via RHSA-2018:0056 https://access.redhat.com/errata/RHSA-2018:0056

Comment 71 errata-xmlrpc 2018-01-05 18:26:32 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 11.0 (Ocata)

Via RHSA-2018:0059 https://access.redhat.com/errata/RHSA-2018:0059

Comment 72 errata-xmlrpc 2018-01-05 18:27:47 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2018:0058 https://access.redhat.com/errata/RHSA-2018:0058

Comment 73 errata-xmlrpc 2018-01-05 18:29:03 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 9.0 (Mitaka)

Via RHSA-2018:0057 https://access.redhat.com/errata/RHSA-2018:0057

Comment 74 errata-xmlrpc 2018-01-05 18:30:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7

Via RHSA-2018:0055 https://access.redhat.com/errata/RHSA-2018:0055

Comment 75 errata-xmlrpc 2018-01-05 18:31:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7

Via RHSA-2018:0054 https://access.redhat.com/errata/RHSA-2018:0054

Comment 76 errata-xmlrpc 2018-01-05 18:32:56 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 12.0 (Pike)

Via RHSA-2018:0060 https://access.redhat.com/errata/RHSA-2018:0060

Comment 80 Sam Fowler 2018-01-08 07:19:31 UTC
Added affects for arm-trusted-firmware based on this advisory:

https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-6

Comment 81 Sam Fowler 2018-01-08 07:21:09 UTC
Created arm-trusted-firmware tracking bugs for this issue:

Affects: fedora-all [bug 1532143]

Comment 83 Jordy Zomer 2018-01-09 12:18:27 UTC
According to https://access.redhat.com/errata/RHSA-2018:0012 this should be fixed on RHEL7 when upgrading microcode_ctl to microcode_ctl-2.1-22.2.el7.x86_64.

This can be mitigated by doing the following:

*   Hardware (CPU microcode) support for mitigation
*   Kernel support for IBRS
*   IBRS enabled for Kernel space
*   IBRS enabled for User space

When I check this, it does have Hardware (CPU microcode) support for mitigation and Kernel support for IBRS. 

Yet IBRS is still not enabled for kernel or user space by default.

Which means you remain vulnerable to the attack.

I validated the above through:

[root@vds-jordyzomer ~]# cat /sys/kernel/debug/x86/ibrs_enabled
0

This variable needs to be set to 2 for the patch to take effect.

Comment 84 Ugo Bellavance 2018-01-09 15:48:05 UTC
On my systems, I get a 1 in this file:

# cat /sys/kernel/debug/x86/ibrs_enabled
1

It passes the test found here: https://github.com/speed47/spectre-meltdown-checker

Are you running on bare metal? I get a 0 on virtualized guests (VMware)

Comment 85 vvm7ua 2018-01-09 15:55:28 UTC
On my dedicated server(SuperMicro MB X11SSL-F,  Intel(R) Xeon(R) CPU E3-1270 v5 @ 3.60GHz, OS CentOS 7 )
# cat /sys/kernel/debug/x86/ibrs_enabled
0
# cat /var/log/yum.log|grep "kernel\|micro"
Jan 09 10:42:56 Updated: kernel-tools-libs-3.10.0-693.11.6.el7.x86_64
Jan 09 10:43:07 Installed: kernel-3.10.0-693.11.6.el7.x86_64
Jan 09 10:43:18 Updated: kernel-tools-3.10.0-693.11.6.el7.x86_64
Jan 09 10:43:23 Updated: 2:microcode_ctl-2.1-22.2.el7.x86_64
#

Comment 86 Jordy Zomer 2018-01-09 16:00:29 UTC
It is indeed a virtualized guest. I believe it appears the Processors are too old. I believe there's no patch available yet for older hardware. Only newer processors.

@vvm7ua Your processor is from 2015. The defaults for older processors are:

pti - 1
ibpb - 0
ibrs - 0 

Looks like we will have to wait :)

Comment 87 Klaas Demter 2018-01-09 16:27:11 UTC
The microcode update microcode_ctl-2.1-22.2.el7.x86_64 only includes updates for certain cpus, what you need is a bios update by your server vendor or a microcode update for your cpu.

If the microcode/bios update is working your cpu will show show with new flags in lscpu: spec_ctrl and ibpb_support
if those are in place ibpb and ibrs default to 1 on boot. (see https://access.redhat.com/articles/3311301).

Comment 91 Robin 2018-01-13 10:37:44 UTC
Hi,
Can I know where the fix for libvirt is as I can't find it in libvirt's upstream or maillist?
Thanks!

Comment 92 Ugo Bellavance 2018-01-15 01:46:54 UTC
Did you check https://access.redhat.com/security/vulnerabilities/speculativeexecution, resolve tab?

Comment 93 Jiri Denemark 2018-01-15 09:04:14 UTC
(In reply to Robin from comment #91)
> Can I know where the fix for libvirt is as I can't find it in libvirt's
> upstream or maillist?

https://www.redhat.com/archives/libvir-list/2018-January/msg00282.html

Comment 94 Robin 2018-01-15 09:34:07 UTC
(In reply to Jiri Denemark from comment #93)
> (In reply to Robin from comment #91)
> > Can I know where the fix for libvirt is as I can't find it in libvirt's
> > upstream or maillist?
> 
> https://www.redhat.com/archives/libvir-list/2018-January/msg00282.html

Thanks a lot Jiri! The code is really helpful which is what I want!

Comment 95 errata-xmlrpc 2018-01-15 21:36:41 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 4.1

Via RHSA-2018:0089 https://access.redhat.com/errata/RHSA-2018:0089

Comment 96 errata-xmlrpc 2018-01-15 21:39:39 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 4.2

Via RHSA-2018:0090 https://access.redhat.com/errata/RHSA-2018:0090

Comment 97 errata-xmlrpc 2018-01-15 21:43:02 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 4.5

Via RHSA-2018:0091 https://access.redhat.com/errata/RHSA-2018:0091

Comment 98 errata-xmlrpc 2018-01-16 20:59:44 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 5.5

Via RHSA-2018:0092 https://access.redhat.com/errata/RHSA-2018:0092

Comment 99 errata-xmlrpc 2018-01-16 22:06:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0094 https://access.redhat.com/errata/RHSA-2018:0094

Comment 100 errata-xmlrpc 2018-01-16 22:27:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support
  Red Hat Enterprise Linux 6.4 Advanced Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support
  Red Hat Enterprise Linux 6.7 Extended Update Support
  Red Hat Enterprise Linux 7.2 Advanced Update Support
  Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.2 Telco Extended Update Support
  Red Hat Enterprise Linux 7.3 Extended Update Support
  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2018:0093 https://access.redhat.com/errata/RHSA-2018:0093

Comment 101 errata-xmlrpc 2018-01-22 10:27:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2018:0106 https://access.redhat.com/errata/RHSA-2018:0106

Comment 102 errata-xmlrpc 2018-01-22 10:28:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2018:0107 https://access.redhat.com/errata/RHSA-2018:0107

Comment 103 errata-xmlrpc 2018-01-22 10:32:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 Advanced Update Support

Via RHSA-2018:0105 https://access.redhat.com/errata/RHSA-2018:0105

Comment 104 errata-xmlrpc 2018-01-22 10:33:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.7 Extended Update Support

Via RHSA-2018:0103 https://access.redhat.com/errata/RHSA-2018:0103

Comment 105 errata-xmlrpc 2018-01-22 10:40:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2018:0112 https://access.redhat.com/errata/RHSA-2018:0112

Comment 106 errata-xmlrpc 2018-01-22 10:41:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2018:0111 https://access.redhat.com/errata/RHSA-2018:0111

Comment 107 errata-xmlrpc 2018-01-22 10:43:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 Advanced Update Support

Via RHSA-2018:0110 https://access.redhat.com/errata/RHSA-2018:0110

Comment 108 errata-xmlrpc 2018-01-22 10:45:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support

Via RHSA-2018:0104 https://access.redhat.com/errata/RHSA-2018:0104

Comment 109 errata-xmlrpc 2018-01-22 10:45:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support

Via RHSA-2018:0109 https://access.redhat.com/errata/RHSA-2018:0109

Comment 110 errata-xmlrpc 2018-01-22 10:49:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.7 Extended Update Support

Via RHSA-2018:0108 https://access.redhat.com/errata/RHSA-2018:0108

Comment 111 errata-xmlrpc 2018-01-25 11:27:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0151 https://access.redhat.com/errata/RHSA-2018:0151

Comment 112 errata-xmlrpc 2018-01-25 12:01:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Extended Update Support

Via RHSA-2018:0182 https://access.redhat.com/errata/RHSA-2018:0182

Comment 114 errata-xmlrpc 2018-02-09 12:57:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5 Extended Lifecycle Support

Via RHSA-2018:0292 https://access.redhat.com/errata/RHSA-2018:0292

Comment 115 errata-xmlrpc 2018-03-13 14:46:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.7 Extended Update Support

Via RHSA-2018:0496 https://access.redhat.com/errata/RHSA-2018:0496

Comment 116 errata-xmlrpc 2018-03-13 18:25:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:0512 https://access.redhat.com/errata/RHSA-2018:0512

Comment 117 errata-xmlrpc 2018-04-10 05:08:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0654 https://access.redhat.com/errata/RHSA-2018:0654

Comment 118 errata-xmlrpc 2018-04-23 12:58:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5 Extended Lifecycle Support

Via RHSA-2018:1196 https://access.redhat.com/errata/RHSA-2018:1196

Comment 120 errata-xmlrpc 2018-04-25 20:37:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5.9 Long Life

Via RHSA-2018:1252 https://access.redhat.com/errata/RHSA-2018:1252

Comment 124 errata-xmlrpc 2018-06-26 15:41:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:1967 https://access.redhat.com/errata/RHSA-2018:1967