<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1420-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-05-25T05:44:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-05-25T05:44:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-05-25T05:44:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3639: Systems with microprocessors utilizing speculative
  execution and speculative execution of memory reads before the addresses
  of all prior memory writes are known may allow unauthorized disclosure
  of information to an attacker with local user access via a side-channel
  analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1087082).

  A new boot commandline option was introduced,
  &amp;quot;spec_store_bypass_disable&amp;quot;, which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as &amp;quot;prctl&amp;quot; above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is &amp;quot;seccomp&amp;quot;, meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - &amp;quot;Vulnerable&amp;quot;
  - &amp;quot;Mitigation: Speculative Store Bypass disabled&amp;quot;
  - &amp;quot;Mitigation: Speculative Store Bypass disabled via prctl&amp;quot;
  - &amp;quot;Mitigation: Speculative Store Bypass disabled via prctl and seccomp&amp;quot;

The following non-security bugs were fixed:

- allow_unsupported: add module tainting on feature use (FATE#323394).
- powerpc/64/kexec: fix race in kexec when XIVE is shutdown (bsc#1088273).
- reiserfs: mark read-write mode unsupported (FATE#323394).
- reiserfs: package in separate KMP (FATE#323394).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-05/msg00101.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1420-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-debug-4.12.14-lp150.12.4.1">kernel-debug-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-base-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-debug-base-4.12.14-lp150.12.4.1">kernel-debug-base-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-debug-devel-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-debug-devel-4.12.14-lp150.12.4.1">kernel-debug-devel-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-default-4.12.14-lp150.12.4.1">kernel-default-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-base-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-default-base-4.12.14-lp150.12.4.1">kernel-default-base-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-default-devel-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-default-devel-4.12.14-lp150.12.4.1">kernel-default-devel-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-devel-4.12.14-lp150.12.4.1">kernel-devel-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-docs-4.12.14-lp150.12.4.1">kernel-docs-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-docs-html-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-docs-html-4.12.14-lp150.12.4.1">kernel-docs-html-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-kvmsmall-4.12.14-lp150.12.4.1">kernel-kvmsmall-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-base-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-kvmsmall-base-4.12.14-lp150.12.4.1">kernel-kvmsmall-base-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-kvmsmall-devel-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-kvmsmall-devel-4.12.14-lp150.12.4.1">kernel-kvmsmall-devel-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-macros-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-macros-4.12.14-lp150.12.4.1">kernel-macros-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-build-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-obs-build-4.12.14-lp150.12.4.1">kernel-obs-build-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-obs-qa-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-obs-qa-4.12.14-lp150.12.4.1">kernel-obs-qa-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-source-4.12.14-lp150.12.4.1">kernel-source-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-vanilla-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-source-vanilla-4.12.14-lp150.12.4.1">kernel-source-vanilla-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-4.12.14-lp150.12.4.1">
      <FullProductName ProductID="kernel-syms-4.12.14-lp150.12.4.1">kernel-syms-4.12.14-lp150.12.4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-debug-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.4.1">kernel-debug-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-base-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.4.1">kernel-debug-base-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-debug-devel-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.4.1">kernel-debug-devel-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.4.1">kernel-default-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-base-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.4.1">kernel-default-base-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-default-devel-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.4.1">kernel-default-devel-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.4.1">kernel-devel-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.4.1">kernel-docs-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-docs-html-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.4.1">kernel-docs-html-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.4.1">kernel-kvmsmall-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-base-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.4.1">kernel-kvmsmall-base-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-kvmsmall-devel-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.4.1">kernel-kvmsmall-devel-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-macros-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.4.1">kernel-macros-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-build-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.4.1">kernel-obs-build-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-obs-qa-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.4.1">kernel-obs-qa-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.4.1">kernel-source-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-vanilla-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.4.1">kernel-source-vanilla-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-4.12.14-lp150.12.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.4.1">kernel-syms-4.12.14-lp150.12.4.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.4.1</ProductID>
        <ProductID>openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-05/msg00101.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113769</URL>
        <Description>SUSE Bug 1113769</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
