SUSE Security Update: Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2266-1
Rating:             important
References:         #1090338 #1096740 
Cross-References:   CVE-2018-3665
Affected Products:
                    SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:

   This update for the Linux Kernel 4.4.120-94_17 fixes several issues.

   The following security issue was fixed:

   - CVE-2018-3665: System software utilizing Lazy FP state restore technique
     on systems using Intel Core-based microprocessors may potentially have
     allowed a local process to infer data from another process via a
     speculative execution side channel (bsc#1090338, bsc#1096740).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Live Patching 12-SP3:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-1526=1



Package List:

   - SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):

      kgraft-patch-4_4_120-94_17-default-4-2.5
      kgraft-patch-4_4_120-94_17-default-debuginfo-4-2.5


References:

   https://www.suse.com/security/cve/CVE-2018-3665.html
   https://bugzilla.suse.com/1090338
   https://bugzilla.suse.com/1096740

SUSE: 2018:2266-1 important: the Linux Kernel (Live Patch 10 for SLE 12 SP3)

August 9, 2018
An update that solves one vulnerability and has one errata is now available

Summary

This update for the Linux Kernel 4.4.120-94_17 fixes several issues. The following security issue was fixed: - CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12-SP3: zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-1526=1 Package List: - SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64): kgraft-patch-4_4_120-94_17-default-4-2.5 kgraft-patch-4_4_120-94_17-default-debuginfo-4-2.5

References

#1090338 #1096740

Cross- CVE-2018-3665

Affected Products:

SUSE Linux Enterprise Live Patching 12-SP3

https://www.suse.com/security/cve/CVE-2018-3665.html

https://bugzilla.suse.com/1090338

https://bugzilla.suse.com/1096740

Severity
Announcement ID: SUSE-SU-2018:2266-1
Rating: important

Related News