Описание
Security update for HA kernel modules
This update provides rebuilds of HA kernel modules with retpoline support to mitigate Spectre Variant 2 (CVE-2017-5715 bsc#1068032)
cluster fs also received these bugfixes:
- backport patch to fix dlmglue false deadlock (bnc#962257)
- Fix for online increase of filesystem in kernel mode fails (bsc#936517).
Список пакетов
SUSE Linux Enterprise High Availability Extension 12
cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1
cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1
dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1
dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1
drbd-8.4.4.7-9.11.1
drbd-kmp-default-8.4.4.7_k3.12.61_52.133-9.11.1
drbd-kmp-xen-8.4.4.7_k3.12.61_52.133-9.11.1
gfs2-kmp-default-3.1.6_k3.12.61_52.133-22.5.1
gfs2-kmp-xen-3.1.6_k3.12.61_52.133-22.5.1
ocfs2-kmp-default-1.8.2_k3.12.61_52.133-22.5.1
ocfs2-kmp-xen-1.8.2_k3.12.61_52.133-22.5.1
Ссылки
- Link for SUSE-SU-2018:1486-1
- E-Mail link for SUSE-SU-2018:1486-1
- SUSE Security Ratings
- SUSE Bug 1068032
- SUSE Bug 936517
- SUSE Bug 962257
- SUSE CVE CVE-2017-5715 page
Описание
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Затронутые продукты
SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-default-1.4_k3.12.61_52.133-26.4.1
SUSE Linux Enterprise High Availability Extension 12:cluster-network-kmp-xen-1.4_k3.12.61_52.133-26.4.1
SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-default-4.0.2_k3.12.61_52.133-22.5.1
SUSE Linux Enterprise High Availability Extension 12:dlm-kmp-xen-4.0.2_k3.12.61_52.133-22.5.1
Ссылки
- CVE-2017-5715
- SUSE Bug 1068032
- SUSE Bug 1074562
- SUSE Bug 1074578
- SUSE Bug 1074701
- SUSE Bug 1074741
- SUSE Bug 1074919
- SUSE Bug 1075006
- SUSE Bug 1075007
- SUSE Bug 1075262
- SUSE Bug 1075419
- SUSE Bug 1076115
- SUSE Bug 1076372
- SUSE Bug 1076606
- SUSE Bug 1078353
- SUSE Bug 1080039
- SUSE Bug 1087887
- SUSE Bug 1087939
- SUSE Bug 1088147
- SUSE Bug 1089055