|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2018-3639: qemu,kvm,libvirt: V4 – Speculative Store Bypass aka "Memory Disambiguation" | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Bruce Rogers <brogers> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | astieger, bpetkov, brogers, duwe, jfehlig, jkosina, mbenes, meissner, mhocko, mlatimer, msuchanek, nstange, ptesarik |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/202788/ | ||
| Whiteboard: | CVSSv3:SUSE:CVE-2018-3639:4.3:(AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 1087078, 1087082 | ||
| Attachments: |
0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-RDS.patch
0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-SSBD.patch Patch to add ssbd to libvirt cpu map |
||
the flag is named ssbd now, but I ghave not seen a patch with that yet. Created attachment 769879 [details]
0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-SSBD.patch
0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-SSBD.patch
v13
(In reply to Marcus Meissner from comment #3) > Created attachment 769879 [details] > 0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-SSBD.patch > > 0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-SSBD.patch > > v13 Looks like we'll also need to tweak some existing QEMU patches (from the last Spectre round) as well. Created attachment 770168 [details]
Patch to add ssbd to libvirt cpu map
From what little I know about spectre v4, I suspect a libvirt patch would look something like this.
I've submitted kvm (sle11) and qemu (sle12) maintenance updates with this patch included as follows: SLE-11 SP3 kvm - MR 165007 SLE-11-SP4 kvm - MR 165008 SLE-12-SP2 qemu - MR 165009 SLE-12-SP3 qemu - MR 165010 can you also do SLE-12-SP1 and SLE-12 GA ? Marcus, are you expecting a libvirt fix as part of this bug? I cooked up the patch in #9 based on the patch in #3, but it would be nice to test it on a machine with all the fixes. E.g. after adding the new feature to cpu_map.xml and restarting libvirtd, ensure the feature is shown within the <host> CPU info from 'virsh capabilities'. (In reply to Marcus Meissner from comment #12) > can you also do SLE-12-SP1 and SLE-12 GA ? SLE-12 qemu - MR 165097 SLE-12-SP1 qemu - MR 165096 issue is public. SUSE-SU-2018:1362-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1079405,1092885 CVE References: CVE-2018-3639 Sources used: SUSE OpenStack Cloud 7 (src): qemu-2.6.2-41.40.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): qemu-2.6.2-41.40.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): qemu-2.6.2-41.40.1 SUSE Enterprise Storage 4 (src): qemu-2.6.2-41.40.1 The libvirt patches were posted to the libvirt list today https://www.redhat.com/archives/libvir-list/2018-May/msg01560.html Since there appears to be no urgent rush for those, I'll add them to the various products tomorrow after they have been committed to libvirt.git. SUSE-SU-2018:1363-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1068032,1082276,1092885 CVE References: CVE-2017-5715,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): qemu-2.3.1-33.9.4 SUSE Linux Enterprise Server 12-SP1-LTSS (src): qemu-2.3.1-33.9.4 I've submitted the libvirt patches to Factory, SLE15, SLE12 SP{2,3}, and SLE11 SP{3,4}. I have not added the patches to SLE12 GA or SLE12 SP1 as was requested for qemu in #12. ATM the libvirt in those products have no spectre patches. I wasn't aware they were needed and no one has asked for them.
SUSE-SU-2018:1378-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1070615,1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-SP3 (src): qemu-2.9.1-6.16.1 SUSE Linux Enterprise Desktop 12-SP3 (src): qemu-2.9.1-6.16.1 SUSE CaaS Platform ALL (src): qemu-2.9.1-6.16.1 openSUSE-SU-2018:1380-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1070615,1092885 CVE References: CVE-2018-3639 Sources used: openSUSE Leap 42.3 (src): qemu-2.9.1-44.1, qemu-linux-user-2.9.1-44.1, qemu-testsuite-2.9.1-44.1 SUSE-SU-2018:1386-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1068032,1082276,1092885 CVE References: CVE-2017-5715,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): qemu-2.0.2-48.40.2 SUSE-SU-2018:1389-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kvm-1.4.2-53.20.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kvm-1.4.2-53.20.1 SUSE-SU-2018:1452-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): libvirt-1.0.5.9-21.9.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): libvirt-1.0.5.9-21.9.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): libvirt-1.0.5.9-21.9.1 SUSE-SU-2018:1475-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): libvirt-1.2.5-23.15.1 SUSE Linux Enterprise Server 11-SP4 (src): libvirt-1.2.5-23.15.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libvirt-1.2.5-23.15.1 SUSE-SU-2018:1479-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): kvm-1.4.2-60.12.1 This is an autogenerated message for OBS integration: This bug (1092885) was mentioned in https://build.opensuse.org/request/show/614294 15.0 / libvirt https://build.opensuse.org/request/show/614311 15.0 / qemu SUSE-SU-2018:1614-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: SUSE OpenStack Cloud 7 (src): libvirt-2.0.0-27.42.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): libvirt-2.0.0-27.42.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): libvirt-2.0.0-27.42.1 SUSE Enterprise Storage 4 (src): libvirt-2.0.0-27.42.1 openSUSE-SU-2018:1621-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: openSUSE Leap 15.0 (src): libvirt-4.0.0-lp150.7.3.1 openSUSE-SU-2018:1628-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1092885,1093169 CVE References: CVE-2018-3639 Sources used: openSUSE Leap 15.0 (src): qemu-2.11.1-lp150.7.3.1, qemu-linux-user-2.11.1-lp150.7.3.1, qemu-testsuite-2.11.1-lp150.7.3.1 (In reply to Marcus Meissner from comment #12) > can you also do SLE-12-SP1 and SLE-12 GA ? I missed this request, but assume you want it for libvirt too. While at it, I backported fixes for other recent CVEs and will submit to 12 GA and SP1 soon. SUSE-SU-2018:2082-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1076500,1079869,1083625,1092885 CVE References: CVE-2017-5715,CVE-2018-1064,CVE-2018-3639,CVE-2018-5748 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): libvirt-1.2.18.4-22.3.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): libvirt-1.2.18.4-22.3.1 SUSE-SU-2018:2141-1: An update that solves 5 vulnerabilities and has 7 fixes is now available. Category: security (important) Bug References: 1076500,1079869,1083625,1092885,854343,897352,954872,956298,964465,968483,980558,987527 CVE References: CVE-2016-5008,CVE-2017-5715,CVE-2018-1064,CVE-2018-3639,CVE-2018-5748 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): libvirt-1.2.5-27.13.1 SUSE-SU-2018:2304-1: An update that solves one vulnerability and has 9 fixes is now available. Category: security (moderate) Bug References: 1074014,1076861,1079150,1087416,1092885,1094325,1094480,1094725,1095556,959329 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): libvirt-3.3.0-5.22.1 SUSE Linux Enterprise Server 12-SP3 (src): libvirt-3.3.0-5.22.1 SUSE Linux Enterprise Desktop 12-SP3 (src): libvirt-3.3.0-5.22.1 openSUSE-SU-2018:2306-1: An update that solves one vulnerability and has 9 fixes is now available. Category: security (moderate) Bug References: 1074014,1076861,1079150,1087416,1092885,1094325,1094480,1094725,1095556,959329 CVE References: CVE-2018-3639 Sources used: openSUSE Leap 42.3 (src): libvirt-3.3.0-18.1 released SUSE-SU-2018:2556-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1092885,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-LTSS (src): qemu-2.0.2-48.43.3 SUSE-SU-2018:2565-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1020928,1092885,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): qemu-2.3.1-33.12.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): qemu-2.3.1-33.12.1 SUSE-SU-2018:2615-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1092885,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 11-SP3-LTSS (src): kvm-1.4.2-53.23.2 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kvm-1.4.2-53.23.2 SUSE-SU-2018:2650-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1092885,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): kvm-1.4.2-60.15.2 SUSE-SU-2018:2973-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1092885,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE OpenStack Cloud 7 (src): qemu-2.6.2-41.43.3 SUSE Linux Enterprise Server for SAP 12-SP2 (src): qemu-2.6.2-41.43.3 SUSE Linux Enterprise Server 12-SP2-LTSS (src): qemu-2.6.2-41.43.3 SUSE Enterprise Storage 4 (src): qemu-2.6.2-41.43.3 SUSE-SU-2018:1362-2: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1079405,1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): qemu-2.6.2-41.40.1 SUSE-SU-2018:1614-2: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1092885 CVE References: CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): libvirt-2.0.0-27.42.1 SUSE-SU-2018:2973-2: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1092885,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): qemu-2.6.2-41.43.3 SUSE-SU-2018:3555-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1092885,1094725,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: SUSE Linux Enterprise Server 12-SP3 (src): qemu-2.9.1-6.19.11 SUSE Linux Enterprise Desktop 12-SP3 (src): qemu-2.9.1-6.19.11 SUSE CaaS Platform ALL (src): qemu-2.9.1-6.19.11 SUSE CaaS Platform 3.0 (src): qemu-2.9.1-6.19.11 openSUSE-SU-2018:3709-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1092885,1094725,1096223,1098735 CVE References: CVE-2018-11806,CVE-2018-12617,CVE-2018-3639 Sources used: openSUSE Leap 42.3 (src): qemu-2.9.1-47.1, qemu-linux-user-2.9.1-47.1, qemu-testsuite-2.9.1-47.2 |
Created attachment 769875 [details] 0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-RDS.patch 0001-i386-Add-bit-2-of-SPEC_CTRL-MSR-support-RDS.patch