My Favorites

Close

Please to see your favorites.

  • Bookmark
  • Email Document
  • Printer Friendly
  • Favorite
  • Rating:

Security Vulnerability: Spectre Variant 3a (Rogue Register Load) aka CVE-2018-3640.

This document (7022950) is provided subject to the disclaimer at the end of this document.

Environment


SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 11

Situation


On Intel x86, speculative reading of MSR registers could leak their values even if the local users was not privileged to read out these registers.

This could result in gaining knowledge e.g. about address mappings for use in further exploitation.

Resolution

Intel will fix this issue solely with CPU Microcode updates, no updates for the Linux Kernel or Hypervisors will be required.

New CPU Microcode can either be received from your BIOS / Hardware vendor or from Intel CPU Microcode download page.

SUSE will also provide these with ucode-intel or microcode_ctl packages once Intel makes them publicly available.

Cause

Additional Information

Related articles :

  • TID 7022512 : Security Vulnerability: "Meltdown" and "Spectre" side channel attacks against CPUs with speculative execution.

  • TID 7022514 : Security Vulnerability: "Meltdown" and "Spectre" - Hypervisor Information.


Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7022950
  • Creation Date:14-MAY-18
  • Modified Date:12-MAY-19
    • SUSESUSE Linux Enterprise Server
< Back to Support Search

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

Join Our Community

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.


SUSE Customer Support Quick Reference Guide SUSE Technical Support Handbook Update Advisories
Support FAQ

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.

Go to Customer Center