[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:1377-2 -- SLES LTSS, kernel, kgraft-patch-4_4_121-92_80-default

ID: oval:org.secpod.oval:def:89044002Date: (C)2021-03-05   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bug was fixed: - CVE-2018-3639: Information leaks using Memory Disambiguation feature in modern CPUs were mitigated, aka Spectre Variant 4 . A new boot commandline option was introduced, spec_store_bypass_disable, which can have following values: - auto: Kernel detects whether your CPU model contains an implementation of Speculative Store Bypass and picks the most appropriate mitigation. - on: disable Speculative Store Bypass - off: enable Speculative Store Bypass - prctl: Control Speculative Store Bypass per thread via prctl. Speculative Store Bypass is enabled for a process by default. The state of the control is inherited on fork. - seccomp: Same as prctl above, but all seccomp threads will disable SSB unless they explicitly opt out. The default is seccomp, meaning programs need explicit opt-in into the mitigation. Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing: - Vulnerable - Mitigation: Speculative Store Bypass disabled - Mitigation: Speculative Store Bypass disabled via prctl - Mitigation: Speculative Store Bypass disabled via prctl and seccomp The following related and non-security bugs were fixed: - cpuid: Fix cpuid.edx.7.0 propagation to guest - ext4: Fix hole length detection in ext4_ind_map_blocks . - ibmvnic: Clean actual number of RX or TX pools . - kvm: Introduce nopvspin kernel parameter . - kvm: Fix nopvspin static branch init usage . - powerpc/64: Use barrier_nospec in syscall entry . - powerpc/64s: Add barrier_nospec . - powerpc/64s: Add support for ori barrier_nospec patching . - powerpc/64s: Enable barrier_nospec based on firmware settings . - powerpc/64s: Enhance the information in cpu_show_meltdown . - powerpc/64s: Enhance the information in cpu_show_spectre_v1 . - powerpc/64s: Fix section mismatch warnings from setup_rfi_flush . - powerpc/64s: Move cpu_show_meltdown . - powerpc/64s: Patch barrier_nospec in modules . - powerpc/64s: Wire up cpu_show_spectre_v1 . - powerpc/64s: Wire up cpu_show_spectre_v2 . - powerpc/powernv: Set or clear security feature flags . - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush . - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags . - powerpc/pseries: Fix clearing of security feature flags . - powerpc/pseries: Restore default security feature flags on setup . - powerpc/pseries: Set or clear security feature flags . - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush . - powerpc/rfi-flush: Always enable fallback flush on pseries . - powerpc/rfi-flush: Differentiate enabled and patched flush types . - powerpc/rfi-flush: Make it possible to call setup_rfi_flush again . - powerpc: Add security feature flags for Spectre/Meltdown . - powerpc: Move default security feature flags . - powerpc: Use barrier_nospec in copy_from_user . Special Instructions and Notes: Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
kernel
kgraft-patch-4_4_121-92_80-default
Reference:
SUSE-SU-2018:1377-2
CVE-2018-3639
CVE    1
CVE-2018-3639
CPE    3
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:12:sp2
cpe:/a:kgraft-patch-4_4_121-92_80-default:kgraft-patch-4_4_121-92_80-default

© SecPod Technologies