{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_138-94_39-default":"2-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_14","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_140-94_42-default":"2-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_138-94_39-default":"2-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_14","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_140-94_42-default":"2-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP3","name":"kgraft-patch-SLE12-SP3_Update_15","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-tools":"1.1-5.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15","name":"kernel-livepatch-tools","purl":"pkg:rpm/suse/kernel-livepatch-tools&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1-5.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kernel-livepatch-tools fixes the following issues:\n\nAdd script for disabling SMT to help with the mitigation of the 'L1 Terminal Fault' issue (CVE-2018-3646 bsc#1099306)\n\nThe script is called 'klp-kvm-l1tf-ctrl-smt' and is used for enabling or disabling SMT to mitigate\nthe issue when this administrative decision is taken.\n\nDisabling SMT:\n\n        klp-kvm-l1tf-ctrl-smt -d\n\nEnabling SMT:\n\n        klp-kvm-l1tf-ctrl-smt -e\n\n","id":"SUSE-SU-2018:2426-1","modified":"2018-08-17T16:21:45Z","published":"2018-08-17T16:21:45Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182426-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1099306"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-3646"}],"related":["CVE-2018-3646"],"summary":"Security update for kernel-livepatch-tools","upstream":["CVE-2018-3646"]}