Lucene search

K
suseSuseOPENSUSE-SU-2021:1212-1
HistoryAug 31, 2021 - 12:00 a.m.

Security update for spectre-meltdown-checker (moderate)

2021-08-3100:00:00
lists.opensuse.org
42

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

An update that fixes one vulnerability is now available.

Description:

This update for spectre-meltdown-checker fixes the following issues:

spectre-meltdown-checker was updated to version 0.44 (bsc#1189477)

  • feat: add support for SRBDS related vulnerabilities
  • feat: add zstd kernel decompression (#370)
  • enh: arm: add experimental support for binary arm images
  • enh: rsb filling: no longer need the ‘strings’ tool to check for kernel
    support in live mode
  • fix: fwdb: remove Intel extract tempdir on exit
  • fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes
    #278)
  • fix: fwdb: use the commit date as the intel fwdb version
  • fix: fwdb: update Intel’s repository URL
  • fix: arm64: CVE-2017-5753: kernels 4.19+ use a different nospec macro
  • fix: on CPU parse info under FreeBSD
  • chore: github: add check run on pull requests
  • chore: fwdb: update to v165.20201021+i20200616

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2021-1212=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N