Skip to content

Commit a417d92

Browse files
authored
Merge pull request #266518 from ChaseCrum/CEOL-22
batch insert EOL even notice
2 parents f47ae35 + 2e45df4 commit a417d92

File tree

3 files changed

+41
-32
lines changed

3 files changed

+41
-32
lines changed

includes/virtual-machines-common-mitigate-se.md

Lines changed: 35 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,10 @@ ms.author: jushiman
1010
ms.custom: include file
1111
---
1212

13-
This article provides guidance for a new class of silicon based micro-architectural and speculative execution side-channel vulnerabilities that affect many modern processors and operating systems. This includes Intel, AMD, and ARM. Specific details for these silicon-based vulnerabilities can be found in the following security advisories and CVEs:
13+
> [!CAUTION]
14+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
15+
16+
This article provides guidance for a new class of silicon based micro-architectural and speculative execution side-channel vulnerabilities that affect many modern processors and operating systems. This includes Intel, AMD, and ARM. Specific details for these silicon-based vulnerabilities can be found in the following security advisories and CVEs:
1417
- [ADV180002 - Guidance to mitigate speculative execution side-channel vulnerabilities](https://msrc.microsoft.com/update-guide/vulnerability/ADV180002)
1518
- [ADV180012 - Microsoft Guidance for Speculative Store Bypass](https://msrc.microsoft.com/update-guide/vulnerability/ADV180012)
1619
- [ADV180013 - Microsoft Guidance for Rogue System Register Read](https://msrc.microsoft.com/update-guide/vulnerability/ADV180013)
@@ -22,57 +25,57 @@ This article provides guidance for a new class of silicon based micro-architectu
2225
- [CVE-2022-21123 - AMD CPU Branch Type Confusion](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23825)
2326

2427

25-
The disclosure of these CPU vulnerabilities has resulted in questions from customers seeking more clarity.
28+
The disclosure of these CPU vulnerabilities has resulted in questions from customers seeking more clarity.
2629

2730
Microsoft has deployed mitigations across all our cloud services. The infrastructure that runs Azure and isolates customer workloads from each other is protected. This means that a potential attacker using the same infrastructure can't attack your application using these vulnerabilities.
2831

2932
Azure is using [memory preserving maintenance](../articles/virtual-machines/maintenance-and-updates.md?bc=%2fazure%2fvirtual-machines%2fwindows%2fbreadcrumb%2ftoc.json%252c%2fazure%2fvirtual-machines%2fwindows%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fvirtual-machines%2fwindows%2ftoc.json%253ftoc%253d%2fazure%2fvirtual-machines%2fwindows%2ftoc.json#maintenance-that-doesnt-require-a-reboot) whenever possible, to minimize customer impact and eliminate the need for reboots. Azure will continue utilizing these methods when making systemwide updates to the host and protect our customers.
3033

31-
More information about how security is integrated into every aspect of Azure is available on the [Azure Security Documentation](../articles/security/index.yml) site.
34+
More information about how security is integrated into every aspect of Azure is available on the [Azure Security Documentation](../articles/security/index.yml) site.
3235

33-
> [!NOTE]
34-
> Since this document was first published, multiple variants of this vulnerability class have been disclosed. Microsoft continues to be heavily invested in protecting our customers and providing guidance. This page will be updated as we continue to release further fixes.
36+
> [!NOTE]
37+
> Since this document was first published, multiple variants of this vulnerability class have been disclosed. Microsoft continues to be heavily invested in protecting our customers and providing guidance. This page will be updated as we continue to release further fixes.
3538
>
3639
> **Customers that are running untrusted code within their VM** need to take action to protect against these vulnerabilities by reading below for more guidance on all vulnerabilities.
3740
>
3841
> Other customers should evaluate these vulnerabilities from a Defense in Depth perspective and consider the security and performance implications of their chosen configuration.
39-
>
42+
>
4043
4144

4245

4346
## Keeping your operating systems up-to-date
4447

45-
While an OS update is not required to isolate your applications running on Azure from other Azure customers, it is always a best practice to keep your software up-to-date. The latest Security Updates for Windows contain mitigations for these vulnerabilities. Similarly, Linux distributions have released multiple updates to address these vulnerabilities. Here are our recommended actions to update your operating system:
48+
While an OS update isn't required to isolate your applications running on Azure from other Azure customers, it is always a best practice to keep your software up-to-date. The latest Security Updates for Windows contain mitigations for these vulnerabilities. Similarly, Linux distributions have released multiple updates to address these vulnerabilities. Here are our recommended actions to update your operating system:
4649

4750
| Offering | Recommended Action |
4851
|----------|---------------------|
4952
| Azure Cloud Services | Enable [auto update](../articles/cloud-services/cloud-services-how-to-configure-portal.md) or ensure you're running the newest Guest OS. |
5053
| Azure Linux Virtual Machines | Install updates from your operating system provider. For more information, see [Linux](#linux) later in this document. |
5154
| Azure Windows Virtual Machines | Install the latest security rollup.
52-
| Other Azure PaaS Services | There is no action needed for customers using these services. Azure automatically keeps your OS versions up-to-date. |
55+
| Other Azure PaaS Services | There's no action needed for customers using these services. Azure automatically keeps your OS versions up-to-date. |
5356

54-
## Additional guidance if you're running untrusted code
57+
## Additional guidance if you're running untrusted code
5558

5659
Customers who allow untrusted users to execute arbitrary code may wish to implement some extra security features inside their Azure Virtual Machines or Cloud Services. These features protect against the intra-process disclosure vectors that several speculative execution vulnerabilities describe.
5760

5861
Example scenarios where more security features are recommended:
5962

60-
- You allow code that you do not trust to run inside your VM.
61-
- *For example, you allow one of your customers to upload a binary or script that you then execute within your application*.
62-
- You allow users that you do not trust to log into your VM using low privileged accounts.
63-
- *For example, you allow a low-privileged user to log into one of your VMs using remote desktop or SSH*.
64-
- You allow untrusted users access to virtual machines implemented via nested virtualization.
65-
- *For example, you control the Hyper-V host, but allocate the VMs to untrusted users*.
63+
- You allow code that you don't trust to run inside your VM.
64+
- *For example, you allow one of your customers to upload a binary or script that you then execute within your application*.
65+
- You allow users that you don't trust to log into your VM using low privileged accounts.
66+
- *For example, you allow a low-privileged user to log into one of your VMs using remote desktop or SSH*.
67+
- You allow untrusted users access to virtual machines implemented via nested virtualization.
68+
- *For example, you control the Hyper-V host, but allocate the VMs to untrusted users*.
6669

67-
Customers who do not implement a scenario involving untrusted code do not need to enable these extra security features.
70+
Customers who don't implement a scenario involving untrusted code don't need to enable these extra security features.
6871

69-
## Enabling additional security
72+
## Enabling additional security
7073

7174
You can enable more security features inside your VM or Cloud Service if you're running untrusted code. In parallel, ensure your operating system is up-to-date to enable security features inside your VM or Cloud Service
7275

73-
### Windows
76+
### Windows
7477

75-
Your target operating system must be up-to-date to enable these extra security features. While numerous mitigations are enabled by default, the extra features described here must be enabled manually and may cause a performance impact.
78+
Your target operating system must be up-to-date to enable these extra security features. While numerous mitigations are enabled by default, the extra features described here must be enabled manually and may cause a performance impact.
7679

7780

7881

@@ -87,7 +90,7 @@ Your target operating system must be up-to-date to enable these extra security f
8790

8891
To validate enabled protections against these vulnerabilities, see [Understanding Get-SpeculationControlSettings PowerShell script output](https://support.microsoft.com/topic/understanding-get-speculationcontrolsettings-powershell-script-output-fd70a80a-a63f-e539-cda5-5be4c9e67c04).
8992

90-
If protections are not enabled, please [contact Azure Support](https://aka.ms/microcodeenablementrequest-supporttechnical) to enable additional controls on your Azure VM.
93+
If protections aren't enabled, please [contact Azure Support](https://aka.ms/microcodeenablementrequest-supporttechnical) to enable additional controls on your Azure VM.
9194

9295
**Step 2:** To enable Kernel Virtual Address Shadowing (KVAS) and Branch Target Injection (BTI) OS support, follow the instructions in [KB4072698](https://support.microsoft.com/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution) to enable protections using the `Session Manager` registry keys. A reboot is required.
9396

@@ -120,14 +123,14 @@ For [CVE-2022-23816](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2
120123
Enabling the set of extra security features inside requires that the target operating system be fully up-to-date. Some mitigations will be enabled by default. The following section describes the features which are off by default and/or reliant on hardware support (microcode). Enabling these features may cause a performance impact. Reference your operating system provider's documentation for further instructions
121124

122125

123-
**Step 1: Disable hyper-threading on the VM** - Customers running untrusted code on a hyper-threaded VM will need to disable hyper-threading or move to a non-hyper-threaded VM. Reference [this doc](../articles/virtual-machines/acu.md) for a list of hyper-threaded VM sizes (where ratio of vCPU to Core is 2:1). To check if you're running a hyper-threaded VM, run the `lscpu` command in the Linux VM.
126+
**Step 1: Disable hyper-threading on the VM** - Customers running untrusted code on a hyper-threaded VM will need to disable hyper-threading or move to a non-hyper-threaded VM. Reference [this doc](../articles/virtual-machines/acu.md) for a list of hyper-threaded VM sizes (where ratio of vCPU to Core is 2:1). To check if you're running a hyper-threaded VM, run the `lscpu` command in the Linux VM.
124127

125-
If `Thread(s) per core = 2`, then hyper-threading has been enabled.
128+
If `Thread(s) per core = 2`, then hyper-threading has been enabled.
126129

127-
If `Thread(s) per core = 1`, then hyper-threading has been disabled.
130+
If `Thread(s) per core = 1`, then hyper-threading has been disabled.
128131

129-
130-
Sample output for a VM with hyper-threading enabled:
132+
133+
Sample output for a VM with hyper-threading enabled:
131134

132135
```console
133136
CPU Architecture: x86_64
@@ -146,17 +149,17 @@ If you're running a hyper-threaded VM, [contact Azure Support](https://aka.ms/Mi
146149

147150

148151

149-
**Step 2:** To mitigate against any of the below CPU based memory vulnerabilities, refer to your operating system provider's documentation:
150-
151-
- [Redhat and CentOS](https://access.redhat.com/security/vulnerabilities)
152-
- [SUSE](https://www.suse.com/support/kb/?doctype%5B%5D=DT_SUSESDB_PSDB_1_1&startIndex=1&maxIndex=0)
153-
- [Ubuntu](https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/)
152+
**Step 2:** To mitigate against any of the below CPU based memory vulnerabilities, refer to your operating system provider's documentation:
153+
154+
- [Redhat and CentOS](https://access.redhat.com/security/vulnerabilities)
155+
- [SUSE](https://www.suse.com/support/kb/?doctype%5B%5D=DT_SUSESDB_PSDB_1_1&startIndex=1&maxIndex=0)
156+
- [Ubuntu](https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/)
154157

155158

156159
### Core count
157160

158-
When a hyper-threaded VM is created, Azure allocates 2 threads per core - these are called vCPUs. When hyper-threading is disabled, Azure removes a thread and surfaces up single threaded cores (physical cores). The ratio of vCPU to CPU is 2:1, so once hyper-threading is disabled, the CPU count in the VM will appear to have decreased by half. For example, a D8_v3 VM is a hyper-threaded VM running on 8 vCPUs (2 threads per core x 4 cores). When hyper-threading is disabled, CPUs will drop to 4 physical cores with 1 thread per core.
161+
When a hyper-threaded VM is created, Azure allocates 2 threads per core - these are called vCPUs. When hyper-threading is disabled, Azure removes a thread and surfaces up single threaded cores (physical cores). The ratio of vCPU to CPU is 2:1, so once hyper-threading is disabled, the CPU count in the VM will appear to have decreased by half. For example, a D8_v3 VM is a hyper-threaded VM running on 8 vCPUs (2 threads per core x 4 cores). When hyper-threading is disabled, CPUs will drop to 4 physical cores with 1 thread per core.
159162

160163
## Next steps
161164

162-
For more information about how security is integrated into every aspect of Azure, see [Azure Security Documentation](../articles/security/index.yml).
165+
For more information about how security is integrated into every aspect of Azure, see [Azure Security Documentation](../articles/security/index.yml).

includes/virtual-machines-n-series-linux-support.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ ms.author: jushiman
1212

1313
## Supported distributions and drivers
1414

15+
> [!CAUTION]
16+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
17+
1518
### NVIDIA CUDA drivers
1619

1720
For the latest CUDA drivers and supported operating systems, visit the [NVIDIA](https://developer.nvidia.com/cuda-zone) website. Ensure that you install or upgrade to the latest supported CUDA drivers for your distribution.

includes/virtual-network-multiple-ip-addresses-os-config.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@
1212

1313
## <a name="os-config"></a>Add IP addresses to a VM operating system
1414

15+
> [!CAUTION]
16+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
17+
1518
Connect and sign in to a VM you created with multiple private IP addresses. You must manually add all the private IP addresses, including the primary, that you added to the VM. Complete the following steps for your VM operating system.
1619

1720
### Windows Server

0 commit comments

Comments
 (0)