SUSE Security Update: Security update for the Linux Kernel (Live Patch 33 for SLE 12)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2107-1
Rating:             important
References:         #1090338 #1096740 
Cross-References:   CVE-2018-3665
Affected Products:
                    SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:

   This update for the Linux Kernel 3.12.61-52_125 fixes several issues.

   The following security issue was fixed:

   - CVE-2018-3665: System software utilizing Lazy FP state restore technique
     on systems using Intel Core-based microprocessors may potentially have
     allowed a local process to infer data from another process via a
     speculative execution side channel (bsc#1090338, bsc#1096740).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2018-1423=1



Package List:

   - SUSE Linux Enterprise Server 12-LTSS (x86_64):

      kgraft-patch-3_12_61-52_125-default-5-2.1
      kgraft-patch-3_12_61-52_125-xen-5-2.1


References:

   https://www.suse.com/security/cve/CVE-2018-3665.html
   https://bugzilla.suse.com/1090338
   https://bugzilla.suse.com/1096740

SUSE: 2018:2107-1 important: the Linux Kernel (Live Patch 33 for SLE 12)

July 27, 2018
An update that solves one vulnerability and has one errata is now available

Summary

This update for the Linux Kernel 3.12.61-52_125 fixes several issues. The following security issue was fixed: - CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2018-1423=1 Package List: - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_125-default-5-2.1 kgraft-patch-3_12_61-52_125-xen-5-2.1

References

#1090338 #1096740

Cross- CVE-2018-3665

Affected Products:

SUSE Linux Enterprise Server 12-LTSS

https://www.suse.com/security/cve/CVE-2018-3665.html

https://bugzilla.suse.com/1090338

https://bugzilla.suse.com/1096740

Severity
Announcement ID: SUSE-SU-2018:2107-1
Rating: important

Related News