[SUSE-SU-2018:1389-1] Security update for kvm

Severity Important
Affected Packages 3
CVEs 1

Security update for kvm

This update for kvm fixes the following issues:

This security issue was fixed:

  • CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

    Systems with microprocessors utilizing speculative execution and speculative
    execution of memory reads before the addresses of all prior memory writes are
    known may allow unauthorized disclosure of information to an attacker with
    local user access via a side-channel analysis.

    This patch permits the new x86 cpu feature flag named 'ssbd' to be
    presented to the guest, given that the host has this feature, and
    KVM exposes it to the guest as well.

    For this feature to be enabled please use the qemu commandline
    -cpu $MODEL,+spec-ctrl,+ssbd
    so the guest OS can take advantage of the feature.

    spec-ctrl and ssbd support is also required in the host.

ID
SUSE-SU-2018:1389-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2018/suse-su-20181389-1/
Published
2018-05-23T13:29:09
(6 years ago)
Modified
2018-05-23T13:29:09
(6 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kvm?arch=x86_64&distro=sles-11&sp=3 suse kvm < 1.4.2-53.20.1 sles-11 x86_64
Affected pkg:rpm/suse/kvm?arch=s390x&distro=sles-11&sp=3 suse kvm < 1.4.2-53.20.1 sles-11 s390x
Affected pkg:rpm/suse/kvm?arch=i586&distro=sles-11&sp=3 suse kvm < 1.4.2-53.20.1 sles-11 i586
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...