SUSE-SU-2024:0885-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20240885-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:0885-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:0885-1
Related
Published
2024-03-14T12:27:32Z
Modified
2024-03-14T12:27:32Z
Summary
Security update for spectre-meltdown-checker
Details

This update for spectre-meltdown-checker fixes the following issues:

  • updated to 0.46 This release mainly focuses on the detection of the new Zenbleed (CVE-2023-20593) vulnerability, among few other changes that were in line waiting for a release:

    • feat: detect the vulnerability and mitigation of Zenbleed (CVE-2023-20593)
    • feat: add the linux-firmware repository as another source for CPU microcode versions
    • feat: arm: add Neoverse-N2, Neoverse-V1 and Neoverse-V2
    • fix: docker: adding missing utils (#433)
    • feat: add support for Guix System kernel
    • fix: rewrite SQL to be sqlite3 >= 3.41 compatible (#443)
    • fix: a /devnull file was mistakenly created on the filesystem
    • fix: fwdb: ignore MCEdb versions where an official Intel version exists (fixes #430)
  • updated to 0.45

    • arm64: phytium: Add CPU Implementer Phytium
    • arm64: variant 4: detect ssbd mitigation from kernel img, system.map or kconfig
    • chore: ensure vars are set before being dereferenced (set -u compat)
    • chore: fix indentation
    • chore: fwdb: update to v220+i20220208
    • chore: only attempt to load msr and cpuid module once
    • chore: read_cpuid: use named constants
    • chore: readme: framapic is gone, host the screenshots on GitHub
    • chore: replace 'Vulnerable to' by 'Affected by' in the hw section
    • chore: speculative execution -> transient execution
    • chore: update fwdb to v222+i20220208
    • chore: update Intel Family 6 models
    • chore: wording: model not vulnerable -> model not affected
    • doc: add an FAQ entry about CVE support
    • doc: add an FAQ.md and update the README.md accordingly
    • doc: more FAQ and README
    • doc: readme: make the FAQ entry more visible
    • feat: add --allow-msr-write, no longer write by default (#385), detect when writing is denied
    • feat: add --cpu, apply changes to (read|write)_msr, update fwdb to v221+i20220208
    • feat: add subleaf != 0 support for read_cpuid
    • feat: arm: add Cortex A77 and Neoverse-N1 (fixes #371)
    • feat: bsd: for unimplemented CVEs, at least report when CPU is not affected
    • feat: hw check: add IPRED, RRSBA, BHI features check
    • feat: implement detection for MCEPSC under BSD
    • feat: set default TMPDIR for Android (#415)
    • fix: extractkernel: don't overwrite kernelerr if already set
    • fix: has_vmm false positive with pcp
    • fix: isucodeblacklisted: fix some model names
    • fix: mcedb: v191 changed the MCE table format
    • fix: refuse to run under MacOS and ESXi
    • fix: retpoline: detection on 5.15.28+ (#420)
    • fix: variant4: added case where prctl ssbd status is tagged as 'unknown'
References

Affected packages

SUSE:Linux Enterprise Server 12 SP5 / spectre-meltdown-checker

Package

Name
spectre-meltdown-checker
Purl
purl:rpm/suse/spectre-meltdown-checker&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.46-3.9.1

Ecosystem specific

{
    "binaries": [
        {
            "spectre-meltdown-checker": "0.46-3.9.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP5 / spectre-meltdown-checker

Package

Name
spectre-meltdown-checker
Purl
purl:rpm/suse/spectre-meltdown-checker&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.46-3.9.1

Ecosystem specific

{
    "binaries": [
        {
            "spectre-meltdown-checker": "0.46-3.9.1"
        }
    ]
}