<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:1377-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-18T12:45:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-18T12:45:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-18T12:45:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

The following related and non-security bugs were fixed:

- cpuid: Fix cpuid.edx.7.0 propagation to guest
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SERVER-12-SP2-BCL-2018-956</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/</URL>
      <Description>Link for SUSE-SU-2018:1377-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:1377-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1056427</URL>
      <Description>SUSE Bug 1056427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1068032</URL>
      <Description>SUSE Bug 1068032</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1075087</URL>
      <Description>SUSE Bug 1075087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1080157</URL>
      <Description>SUSE Bug 1080157</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1087082</URL>
      <Description>SUSE Bug 1087082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1090953</URL>
      <Description>SUSE Bug 1090953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1091041</URL>
      <Description>SUSE Bug 1091041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1092289</URL>
      <Description>SUSE Bug 1092289</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1093215</URL>
      <Description>SUSE Bug 1093215</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094019</URL>
      <Description>SUSE Bug 1094019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3639/</URL>
      <Description>SUSE CVE CVE-2018-3639 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2-BCL">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL" CPE="cpe:/o:suse:sles-bcl:12:sp2">SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-default-4.4.121-92.80.1">kernel-default-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-default-base-4.4.121-92.80.1">kernel-default-base-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-default-devel-4.4.121-92.80.1">kernel-default-devel-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-devel-4.4.121-92.80.1">kernel-devel-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-macros-4.4.121-92.80.1">kernel-macros-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-source-4.4.121-92.80.1">kernel-source-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.4.121-92.80.1">
      <FullProductName ProductID="kernel-syms-4.4.121-92.80.1">kernel-syms-4.4.121-92.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_4_121-92_80-default-1-3.5.2">
      <FullProductName ProductID="kgraft-patch-4_4_121-92_80-default-1-3.5.2">kgraft-patch-4_4_121-92_80-default-1-3.5.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-default-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.80.1">kernel-default-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.80.1">kernel-default-base-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.80.1">kernel-default-devel-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.80.1">kernel-devel-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.80.1">kernel-macros-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.80.1">kernel-source-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.4.121-92.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.80.1">kernel-syms-4.4.121-92.80.1 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
    <Relationship ProductReference="kgraft-patch-4_4_121-92_80-default-1-3.5.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2-BCL">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_80-default-1-3.5.2">kgraft-patch-4_4_121-92_80-default-1-3.5.2 as a component of SUSE Linux Enterprise Server 12 SP2-BCL</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_80-default-1-3.5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092631</URL>
        <Description>SUSE Bug 1092631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092885</URL>
        <Description>SUSE Bug 1092885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111963</URL>
        <Description>SUSE Bug 1111963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
