Security Vulnerability: Spectre Variant 3a (Rogue Register Load) aka CVE-2018-3640.
This document (7022950) is provided subject to the disclaimer at the end of this document.
Environment
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 11
Situation
On Intel x86, speculative reading of MSR registers could leak their values even if the local users was not privileged to read out these registers.
This could result in gaining knowledge e.g. about address mappings for use in further exploitation.
Resolution
New CPU Microcode can either be received from your BIOS / Hardware vendor or from Intel CPU Microcode download page.
SUSE will also provide these with ucode-intel or microcode_ctl packages once Intel makes them publicly available.
Cause
Additional Information
Related articles :
TID 7022512 : Security Vulnerability: "Meltdown" and "Spectre" side channel attacks against CPUs with speculative execution.
TID 7022514 : Security Vulnerability: "Meltdown" and "Spectre" - Hypervisor Information.
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7022950
- Creation Date: 14-May-2018
- Modified Date:03-Mar-2020
-
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com