Virtuozzo Addresses Intel Bug Questions

January 3, 2018

Updated: January 15, 2018 11:15 AM PST

Virtuozzo provided fixes for Meltdown and Spectre vulnerabilities in modern CPUs and OSes. In order to keep you informed and up-to-date on this issue, its impact on your business and our plan to support you, please review the following Q&A. To ensure you receive all updates going forward, subscribe to our email notification here.

Q: How to fix vulnerability?
1) Microcode update is required
To address CVE-2017-5715, also known as Spectre variant 2, it is needed to install new microcode on the hardware nodes. Some microcodes are shipped with the `microcode_ctl` package, some are not. This article helps to understand whether it is needed to download and install new microcode.

2) Install Virtuozzo update

PlatformStatusAdvisory
Virtuozzo 7Publishedhttps://help.virtuozzo.com/customer/portal/articles/2914297
Then stop and start virtual machines from the server side (please do not reboot VMs from inside the guest). It will recreate qemu process, and the virtual machine will use a new processor supporting all the necessary mitigation features.
Virtuozzo 6 - ContainersPublishedhttps://help.virtuozzo.com/customer/portal/articles/2914057
Virtuozzo 6 - VMsIn ProgressETA-January 30
Virtuozzo 5 (PSBM 5) - ContainersPublishedhttps://help.virtuozzo.com/customer/portal/articles/2914056
Virtuozzo 5 (PSBM 5) - VMsIn ProgressETA-January 30
Virtuozzo 4.7Publishedhttps://help.virtuozzo.com/customer/portal/articles/2914056
Virtuozzo Windows 6PublishedVZU600054
Virtuozzo Windows 4.6PublishedVZU460129
OpenVZ 7Publishedhttps://download.openvz.org/virtuozzo/releases/openvz-7.0.6-509/

https://download.openvz.org/virtuozzo/releases/7.0/x86_64/os/repoview/

OpenVZPublishedhttps://openvz.org/Download/kernel/rhel6/042stab127.2

Q: What is the source of the vulnerability?
A: An Intel hardware design flaw that affects all of the latest Intel x86-64 chipsets. Unfortunately there is no fix on a microcode level, so the fix will be implemented in particular operating systems. MITRE CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754. Here is the detailed description of vulnerabilities https://spectreattack.com/

Q: What operating systems are affected?
A: All operating systems are affected, the whole Linux family, Windows and MacOS.

Q: What is Virtuozzo doing to address the performance issues?
A: Virtuozzo is dedicated to providing constant improvements for our partners and will continue to strive to maximize efficiency and performance. Our first priority was to solve the security concerns, but our effort will not stop there. We will continue to keep you informed of performance testing, as it becomes available.

Q: Some articles report performance penalties due to the fix, will it impact Virtuozzo platform?
A: Yes, it is expected to have an impact, KPTI comes with a measurable run-time cost. However the numbers are quite broad, LWN estimates it at about 5%. Here is the LWN article: “Most workloads that we have run show single-digit regressions. 5% is a good round number for what is typical. The worst we have seen is a roughly 30% regression on a loopback networking test that did a ton of syscalls and context switches.” That is a cost that some users may not want to pay, especially once they get newer processors that lack these problems. There will be a nopti command-line option to disable this mechanism at boot time. Virtuozzo will provide performance tests results for specific versions, at this point there is no reliable data available.

Q: How should I plan for the update?
A: This fix will require a server reboot. Please plan maintenance windows and notify customers about upcoming maintenance.

Please subscribe for Virtuozzo security updates here to get notifications about updates.

Get more information today!