Looking at the changelog for the updated kernel RPMs released today I see
35 fixes for x86 relating to placing barriers to speculative execution and
53 for Kaiser (separating kernel/user address spaces). There are no
comments for s390 specifically but a few relating to Spectre for all
arches (or those that support certain device drivers):

- [misc] locking/barriers: prevent speculative execution based on Coverity
scan results (Josh Poimboeuf) [1519788 1519786] {CVE-2017-5753}
- [fs] udf: prevent speculative execution (Josh Poimboeuf) [1519788
1519786] {CVE-2017-5753}
- [fs] prevent speculative execution (Josh Poimboeuf) [1519788 1519786]
{CVE-2017-5753}
- [kernel] userns: prevent speculative execution (Josh Poimboeuf) [1519788
1519786] {CVE-2017-5753}
- [scsi] qla2xxx: prevent speculative execution (Josh Poimboeuf) [1519788
1519786] {CVE-2017-5753}
- [netdrv] p54: prevent speculative execution (Josh Poimboeuf) [1519788
1519786] {CVE-2017-5753}
- [netdrv] carl9170: prevent speculative execution (Josh Poimboeuf)
[1519788 1519786] {CVE-2017-5753}
- [media] uvcvideo: prevent speculative execution (Josh Poimboeuf)
[1519788 1519786] {CVE-2017-5753}


I am not sure what this tells us of the vulnerability of s390 and Power to
these attacks - particularly since both have been kaiser-ized since they
were made available.

A search of ibm.com still does not reveal any official statements about
spectre or meltdown wrt s390 and Power.

Neale 

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to