SUSE-SU-2018:1377-2 -- SLES LTSS, kernel, kgraft-patch-4_4_121-92_80-defaultID: oval:org.secpod.oval:def:89044002 | Date: (C)2021-03-05 (M)2024-04-17 |
Class: PATCH | Family: unix |
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bug was fixed: - CVE-2018-3639: Information leaks using Memory Disambiguation feature in modern CPUs were mitigated, aka Spectre Variant 4 . A new boot commandline option was introduced, spec_store_bypass_disable, which can have following values: - auto: Kernel detects whether your CPU model contains an implementation of Speculative Store Bypass and picks the most appropriate mitigation. - on: disable Speculative Store Bypass - off: enable Speculative Store Bypass - prctl: Control Speculative Store Bypass per thread via prctl. Speculative Store Bypass is enabled for a process by default. The state of the control is inherited on fork. - seccomp: Same as prctl above, but all seccomp threads will disable SSB unless they explicitly opt out. The default is seccomp, meaning programs need explicit opt-in into the mitigation. Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing: - Vulnerable - Mitigation: Speculative Store Bypass disabled - Mitigation: Speculative Store Bypass disabled via prctl - Mitigation: Speculative Store Bypass disabled via prctl and seccomp The following related and non-security bugs were fixed: - cpuid: Fix cpuid.edx.7.0 propagation to guest - ext4: Fix hole length detection in ext4_ind_map_blocks . - ibmvnic: Clean actual number of RX or TX pools . - kvm: Introduce nopvspin kernel parameter . - kvm: Fix nopvspin static branch init usage . - powerpc/64: Use barrier_nospec in syscall entry . - powerpc/64s: Add barrier_nospec . - powerpc/64s: Add support for ori barrier_nospec patching . - powerpc/64s: Enable barrier_nospec based on firmware settings . - powerpc/64s: Enhance the information in cpu_show_meltdown . - powerpc/64s: Enhance the information in cpu_show_spectre_v1 . - powerpc/64s: Fix section mismatch warnings from setup_rfi_flush . - powerpc/64s: Move cpu_show_meltdown . - powerpc/64s: Patch barrier_nospec in modules . - powerpc/64s: Wire up cpu_show_spectre_v1 . - powerpc/64s: Wire up cpu_show_spectre_v2 . - powerpc/powernv: Set or clear security feature flags . - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush . - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags . - powerpc/pseries: Fix clearing of security feature flags . - powerpc/pseries: Restore default security feature flags on setup . - powerpc/pseries: Set or clear security feature flags . - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush . - powerpc/rfi-flush: Always enable fallback flush on pseries . - powerpc/rfi-flush: Differentiate enabled and patched flush types . - powerpc/rfi-flush: Make it possible to call setup_rfi_flush again . - powerpc: Add security feature flags for Spectre/Meltdown . - powerpc: Move default security feature flags . - powerpc: Use barrier_nospec in copy_from_user . Special Instructions and Notes: Please reboot the system after installing this update.
Platform: |
SUSE Linux Enterprise Server 12 SP2 |
Product: |
kernel |
kgraft-patch-4_4_121-92_80-default |