VirtualBox

Changeset 78632 in vbox for trunk/doc/manual/en_US


Ignore:
Timestamp:
May 21, 2019 1:56:11 PM (6 years ago)
Author:
vboxsync
Message:

Forward ported 130474,130475,130477,130479. bugref:9453

Location:
trunk
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk

    • Property svn:mergeinfo
      •  

        old new  
        99/branches/VBox-5.1:112367,115992,116543,116550,116568,116573
        1010/branches/VBox-5.2:119536,120083,120099,120213,120221,120239,123597-123598,123600-123601,123755,124260,124263,124271,124273,124277-124279,124284-124286,124288-124290,125768,125779-125780,125812
         11/branches/VBox-6.0:130474-130475,130477,130479
        1112/branches/aeichner/vbox-chromium-cleanup:129816,129818-129851,129853-129861,129871-129872,129876,129880,129882,130013-130015,130036,130094-130095
        1213/branches/andy/draganddrop:90781-91268
  • trunk/doc/manual/en_US/user_Security.xml

    r76786 r78632  
    637637    </sect2>
    638638
     639    <sect2 id="sec-rec-cve-2018-12126-et-al">
     640
     641      <title>CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091</title>
     642
     643      <para>
     644        These security issues affect a range of Intel CPUs starting with
     645        Nehalem.  The CVE-2018-12130 also affects some Atom Silvermont,
     646        Atom Airmont, and Knights family CPUs, however the scope is so limited
     647        that the host OS should deal with it for us and VBox therefore not
     648        be affected (leaks only happens when entering and leaving C states).
     649      </para>
     650
     651      <para>
     652        Mitigation option:
     653      </para>
     654
     655      <sect3>
     656
     657        <title>Buffer overwriting and disabling HT</title>
     658
     659        <para>
     660          First, up to date CPU microcode is a prerequisite for the buffer
     661          overwriting (clearing) mitigations.  Some host OSes may install
     662          these automatically, though it has traditionally been a task best
     663          performed by the system firmware.  So, please check with your
     664          system / mainboard manufacturer for the latest firmware update.
     665        </para>
     666
     667        <para>
     668          This mitigation aims at removing potentially sensitive data from
     669          the affected buffers before running guest code.  Since this means
     670          additional work each time the guest is scheduled, there might be
     671          some performance side effects.
     672        </para>
     673
     674        <para>
     675          We recommend disabling hyper threading on host affected by
     676          CVE-2018-12126 and CVE-2018-12127 because the affected sets of
     677          buffers are normally shared between thread pairs and therefore
     678          cause leaks between the threads. This is traditionally done from
     679          the firmware setup, but some OSes also offers ways disable HT. In
     680          some cases it may be disabled by default, but please verify as the
     681          effectiveness of the mitigation depends on it.
     682        </para>
     683
     684        <para>
     685          The default action taken by VirtualBox is to clear the affected
     686          buffers when a thread is scheduled to execute guest code, rather
     687          than on each VM entry. This reduces the performance impact, while
     688          making the assumption that the host OS will not handle security
     689          sensitive data from interrupt handlers and similar without taking
     690          precautions.
     691        </para>
     692
     693        <para>
     694          A more aggressive flushing option is provided via the
     695          VBoxManage modifyvm option
     696          <computeroutput>--mds-clear-on-vm-entry</computeroutput>. When
     697          enabled the affected buffers will be cleared on every VM entry.
     698          The performance impact is greater than with the default option,
     699          though this of course depends on the workload.  Workloads producing
     700          a lot of VM exits (like networking, VGA access, and similiar) will
     701          probably be most impacted.
     702        </para>
     703
     704        <para>
     705          For users not concerned by this security issue, the default
     706          mitigation can be disabled using
     707        </para>
     708
     709        <para>
     710          <computeroutput>VBoxManage modifyvm name --mds-clear-on-sched
     711          off</computeroutput>
     712        </para>
     713
     714      </sect3>
     715
     716    </sect2>
     717
    639718  </sect1>
    640719
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette