patch against Kernel Side-Channel Attack vulnerabilities

Description

A new set ov vulnerabilities was recently published that affects all systems on x86 platforms and affects process isolation:
https://access.redhat.com/security/vulnerabilities/speculativeexecution

We need to patch our systems once Fedora and CentOS release new kernels. This ticket will serve as a tracker for this activity.

Activity

Show:

Former user February 6, 2018 at 1:03 PM

Production systems patched, closing the tracker ticket.

Former user January 21, 2018 at 11:02 AM

AFAIK, is working on a fix from OST's side.

Former user January 21, 2018 at 11:00 AM

Update: bare metals updated yesterday, however this seems to have caused a CPU model change due to an update to libvirt which was released during last week. Now the new model is shown even with an old BIOS on systems with updated microcode, unlike before.

The steps to roll back are:
systemctl stop libvirtd
yum downgrade libvirt*
systemctl start libvirtd

virsh -r capabilities | head
<capabilities>

<host>
<uuid>4c4c4544-0038-4610-8035-b7c04f333832</uuid>
<cpu>
<arch>x86_64</arch>
<model>Haswell-noTSX</model>
<vendor>Intel</vendor>

please tell me if you'd like me to do this on all the systems right now or it's better to fix it from lago side today?

Former user January 18, 2018 at 4:20 PM

Status update:

  • all hypervisors patched

  • all slave VMs patched

  • most production VMs patch with a few exceptions

  • baremetals BIOS patching not performed due to issues with lago, but I will update the OS on them anyway

Former user January 10, 2018 at 2:35 PM

Systems updated except gerrit which failed to boot with the newest kernel so I booted it back with the older one. Opened https://ovirt-jira.atlassian.net/browse/OVIRT-1838#icft=OVIRT-1838 to figure out why that happened as it's a PV guest on AWS (XEN domU) which is something we can't really test in PHX.

Also, updated firmware on ovirt-srv17 and got the desired CPU model which is a step in the right direction:

<cpu>
<arch>x86_64</arch>
<model>Haswell-noTSX-IBRS</model>
<vendor>Intel</vendor>
<microcode version='59'/>
...

Done

Details

Assignee

Reporter

Components

Priority

Created January 4, 2018 at 10:01 AM
Updated February 28, 2018 at 3:33 PM
Resolved February 6, 2018 at 1:03 PM

Flag notifications