Описание
Security update for oracleasm kmp
This update provides rebuilt kernel modules for SUSE Linux Enterprise 12 SP3 products with retpoline enablement to address Spectre Variant 2 (CVE-2017-5715 bsc#1068032).
Following modules have been rebuilt:
- drbd
- oracleasm
- crash
- lttng-modules
Список пакетов
SUSE Linux Enterprise High Availability Extension 12 SP3
drbd-9.0.8+git.c8bc3670-3.5.1
drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1
SUSE Linux Enterprise Server 12 SP3
crash-7.1.8-4.8.1
crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1
lttng-modules-2.7.1-8.2.1
lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1
oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
crash-7.1.8-4.8.1
crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1
lttng-modules-2.7.1-8.2.1
lttng-modules-kmp-default-2.7.1_k4.4.131_94.29-8.2.1
oracleasm-kmp-default-2.0.8_k4.4.131_94.29-3.8.1
SUSE Linux Enterprise Software Development Kit 12 SP3
crash-devel-7.1.8-4.8.1
Ссылки
- Link for SUSE-SU-2018:1503-1
- E-Mail link for SUSE-SU-2018:1503-1
- SUSE Security Ratings
- SUSE Bug 1068032
- SUSE CVE CVE-2017-5715 page
Описание
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Затронутые продукты
SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-9.0.8+git.c8bc3670-3.5.1
SUSE Linux Enterprise High Availability Extension 12 SP3:drbd-kmp-default-9.0.8+git.c8bc3670_k4.4.131_94.29-3.5.1
SUSE Linux Enterprise Server 12 SP3:crash-7.1.8-4.8.1
SUSE Linux Enterprise Server 12 SP3:crash-kmp-default-7.1.8_k4.4.131_94.29-4.8.1
Ссылки
- CVE-2017-5715
- SUSE Bug 1068032
- SUSE Bug 1074562
- SUSE Bug 1074578
- SUSE Bug 1074701
- SUSE Bug 1074741
- SUSE Bug 1074919
- SUSE Bug 1075006
- SUSE Bug 1075007
- SUSE Bug 1075262
- SUSE Bug 1075419
- SUSE Bug 1076115
- SUSE Bug 1076372
- SUSE Bug 1076606
- SUSE Bug 1078353
- SUSE Bug 1080039
- SUSE Bug 1087887
- SUSE Bug 1087939
- SUSE Bug 1088147
- SUSE Bug 1089055