[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:1377-1 -- SLES kernel

ID: oval:org.secpod.oval:def:89002296Date: (C)2021-02-25   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bug was fixed: - CVE-2018-3639: Information leaks using quot;Memory Disambiguationquot; feature in modern CPUs were mitigated, aka quot;Spectre Variant 4quot; . A new boot commandline option was introduced, quot;spec_store_bypass_disablequot;, which can have following values: - auto: Kernel detects whether your CPU model contains an implementation of Speculative Store Bypass and picks the most appropriate mitigation. - on: disable Speculative Store Bypass - off: enable Speculative Store Bypass - prctl: Control Speculative Store Bypass per thread via prctl. Speculative Store Bypass is enabled for a process by default. The state of the control is inherited on fork. - seccomp: Same as quot;prctlquot; above, but all seccomp threads will disable SSB unless they explicitly opt out. The default is quot;seccompquot;, meaning programs need explicit opt-in into the mitigation. Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing: - quot;Vulnerablequot; - quot;Mitigation: Speculative Store Bypass disabledquot; - quot;Mitigation: Speculative Store Bypass disabled via prctlquot; - quot;Mitigation: Speculative Store Bypass disabled via prctl and seccompquot; The following related and non-security bugs were fixed: - cpuid: Fix cpuid.edx.7.0 propagation to guest - ext4: Fix hole length detection in ext4_ind_map_blocks . - ibmvnic: Clean actual number of RX or TX pools . - kvm: Introduce nopvspin kernel parameter . - kvm: Fix nopvspin static branch init usage . - powerpc/64: Use barrier_nospec in syscall entry . - powerpc/64s: Add barrier_nospec . - powerpc/64s: Add support for ori barrier_nospec patching . - powerpc/64s: Enable barrier_nospec based on firmware settings . - powerpc/64s: Enhance the information in cpu_show_meltdown . - powerpc/64s: Enhance the information in cpu_show_spectre_v1 . - powerpc/64s: Fix section mismatch warnings from setup_rfi_flush . - powerpc/64s: Move cpu_show_meltdown . - powerpc/64s: Patch barrier_nospec in modules . - powerpc/64s: Wire up cpu_show_spectre_v1 . - powerpc/64s: Wire up cpu_show_spectre_v2 . - powerpc/powernv: Set or clear security feature flags . - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush . - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags . - powerpc/pseries: Fix clearing of security feature flags . - powerpc/pseries: Restore default security feature flags on setup . - powerpc/pseries: Set or clear security feature flags . - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush . - powerpc/rfi-flush: Always enable fallback flush on pseries . - powerpc/rfi-flush: Differentiate enabled and patched flush types . - powerpc/rfi-flush: Make it possible to call setup_rfi_flush again . - powerpc: Add security feature flags for Spectre/Meltdown . - powerpc: Move default security feature flags . - powerpc: Use barrier_nospec in copy_from_user .

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
kernel
Reference:
SUSE-SU-2018:1377-1
CVE-2018-3639
CVE    1
CVE-2018-3639

© SecPod Technologies