openSUSE Security Update : various KMPs (openSUSE-2018-284) (Spectre)

Medium Nessus Plugin ID 108478

Synopsis

The remote openSUSE host is missing a security update.

Description

The Spectre Variant 2 in the Linux Kernel is mitigated using 'retpolines'.

This update rebuilds all openSUSE Leap 42.3 KMPs to use 'retpolines' and so be able to mitigate the Spectre v2 attack. (bsc#1068032 CVE-2017-5715)

Solution

Update the affected various KMPs packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1068032

Plugin Details

Severity: Medium

ID: 108478

File Name: openSUSE-2018-284.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2018/03/20

Updated: 2018/03/22

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS v3.0

Base Score: 5.6

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:bbswitch, p-cpe:/a:novell:opensuse:bbswitch-debugsource, p-cpe:/a:novell:opensuse:bbswitch-kmp-default, p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:crash, p-cpe:/a:novell:opensuse:crash-debuginfo, p-cpe:/a:novell:opensuse:crash-debugsource, p-cpe:/a:novell:opensuse:crash-devel, p-cpe:/a:novell:opensuse:crash-eppic, p-cpe:/a:novell:opensuse:crash-eppic-debuginfo, p-cpe:/a:novell:opensuse:crash-gcore, p-cpe:/a:novell:opensuse:crash-gcore-debuginfo, p-cpe:/a:novell:opensuse:crash-kmp-default, p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:dpdk, p-cpe:/a:novell:opensuse:dpdk-debuginfo, p-cpe:/a:novell:opensuse:dpdk-debugsource, p-cpe:/a:novell:opensuse:dpdk-devel, p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo, p-cpe:/a:novell:opensuse:dpdk-examples, p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo, p-cpe:/a:novell:opensuse:dpdk-kmp-default, p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:dpdk-tools, p-cpe:/a:novell:opensuse:drbd, p-cpe:/a:novell:opensuse:drbd-debugsource, p-cpe:/a:novell:opensuse:drbd-kmp-default, p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:drm-debugsource, p-cpe:/a:novell:opensuse:drm-kmp-default, p-cpe:/a:novell:opensuse:drm-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:ftsteutates-debugsource, p-cpe:/a:novell:opensuse:ftsteutates-kmp-default, p-cpe:/a:novell:opensuse:ftsteutates-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:ftsteutates-sensors, p-cpe:/a:novell:opensuse:hdjmod-debugsource, p-cpe:/a:novell:opensuse:hdjmod-kmp-default, p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:ipset, p-cpe:/a:novell:opensuse:ipset-debuginfo, p-cpe:/a:novell:opensuse:ipset-debugsource, p-cpe:/a:novell:opensuse:ipset-devel, p-cpe:/a:novell:opensuse:ipset-kmp-default, p-cpe:/a:novell:opensuse:ipset-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:libipset3, p-cpe:/a:novell:opensuse:libipset3-debuginfo, p-cpe:/a:novell:opensuse:ndiswrapper, p-cpe:/a:novell:opensuse:ndiswrapper-debuginfo, p-cpe:/a:novell:opensuse:ndiswrapper-debugsource, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default, p-cpe:/a:novell:opensuse:ndiswrapper-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:pcfclock, p-cpe:/a:novell:opensuse:pcfclock-debuginfo, p-cpe:/a:novell:opensuse:pcfclock-debugsource, p-cpe:/a:novell:opensuse:pcfclock-kmp-default, p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:sysdig, p-cpe:/a:novell:opensuse:sysdig-debuginfo, p-cpe:/a:novell:opensuse:sysdig-debugsource, p-cpe:/a:novell:opensuse:sysdig-kmp-default, p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:vhba-kmp-debugsource, p-cpe:/a:novell:opensuse:vhba-kmp-default, p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons, p-cpe:/a:novell:opensuse:xtables-addons-debuginfo, p-cpe:/a:novell:opensuse:xtables-addons-debugsource, p-cpe:/a:novell:opensuse:xtables-addons-kmp-default, p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo, cpe:/o:novell:opensuse:42.3

Patch Publication Date: 2018/03/19

Reference Information

CVE: CVE-2017-5715

IAVA: 2018-A-0020