Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 11 Dec 2019 11:54:35 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL
 to guest - incomplete fix for TAA (CVE-2019-11135)

+-- On Tue, 10 Dec 2019, Tyler Hicks wrote --+
| > Another option: Export MDS_NO=0 to guests when TSX is enabled
| >   -> https://git.kernel.org/linus/e1d38b63acd843cfdd4222bf19a26700fd5c699e
| 
| Is the CVE assignment specifically for a distro kernel that didn't
| include commit e1d38b63acd8 ("kvm/x86: Export MDS_NO=0 to guests when
| TSX is enabled")?

Right, and have TSX enabled by default.

Thank you.
--
Prasad J Pandit / Red Hat Product Security Team
8685 545E B54C 486B C6EB 271E E285 8B5A F050 DE8D

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.