openSUSE: 2019:1402-1: important: ucode-intel

    Date16 May 2019
    CategoryopenSUSE
    285
    Posted ByLinuxSecurity Advisories
    An update that fixes four vulnerabilities is now available.
       openSUSE Security Update: Security update for ucode-intel
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2019:1402-1
    Rating:             important
    References:         #1111331 
    Cross-References:   CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
                        CVE-2019-11091
    Affected Products:
                        openSUSE Leap 15.0
    ______________________________________________________________________________
    
       An update that fixes four vulnerabilities is now available.
    
    Description:
    
       This update for ucode-intel fixes the following issues:
    
       This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)
    
       Four new speculative execution information leak issues have been
       identified in Intel CPUs. (bsc#1111331)
    
       - CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
       - CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
       - CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
       - CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory
         (MDSUM)
    
       These updates contain the CPU Microcode adjustments for the software
       mitigations.
    
       For more information on this set of vulnerabilities, check out
       https://www.suse.com/support/kb/doc/?id=7023736
    
    
       Release notes:
    
       - Processor             Identifier     Version       Products
       - Model        Stepping F-MO-S/PI      Old->New
       - ---- new platforms ----------------------------------------
       - CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
       - ---- updated platforms ------------------------------------
       - SNB          D2/G1/Q0 6-2a-7/12 0000002e->0000002f Core Gen2
       - IVB          E1/L1    6-3a-9/12 00000020->00000021 Core Gen3
       - HSW          C0       6-3c-3/32 00000025->00000027 Core Gen4
       - BDW-U/Y      E0/F0    6-3d-4/c0 0000002b->0000002d Core Gen5
       - IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e->0000042f Core Gen3 X Series;
         Xeon E5 v2
       - IVB-EX       D1       6-3e-7/ed 00000714->00000715 Xeon E7 v2
       - HSX-E/EP     Cx/M1    6-3f-2/6f 00000041->00000043 Core Gen4 X series;
         Xeon E5 v3
       - HSX-EX       E0       6-3f-4/80 00000013->00000014 Xeon E7 v3
       - HSW-U        C0/D0    6-45-1/72 00000024->00000025 Core Gen4
       - HSW-H        C0       6-46-1/32 0000001a->0000001b Core Gen4
       - BDW-H/E3     E0/G0    6-47-1/22 0000001e->00000020 Core Gen5
       - SKL-U/Y      D0/K1    6-4e-3/c0 000000c6->000000cc Core Gen6
       - SKX-SP       H0/M0/U0 6-55-4/b7 0200005a->0000005e Xeon Scalable
       - SKX-D        M1       6-55-4/b7 0200005a->0000005e Xeon D-21xx
       - BDX-DE       V1       6-56-2/10 00000019->0000001a Xeon D-1520/40
       - BDX-DE       V2/3     6-56-3/10 07000016->07000017 Xeon
         D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
       - BDX-DE       Y0       6-56-4/10 0f000014->0f000015 Xeon
         D-1557/59/67/71/77/81/87
       - BDX-NS       A0       6-56-5/10 0e00000c->0e00000d Xeon
         D-1513N/23/33/43/53
       - APL          D0       6-5c-9/03 00000036->00000038 Pentium N/J4xxx,
         Celeron N/J3xxx, Atom x5/7-E39xx
       - SKL-H/S      R0/N0    6-5e-3/36 000000c6->000000cc Core Gen6; Xeon E3 v5
       - DNV          B0       6-5f-1/01 00000024->0000002e Atom Processor C
         Series
       - GLK          B0       6-7a-1/01 0000002c->0000002e Pentium Silver
         N/J5xxx, Celeron N/J4xxx
       - AML-Y22      H0       6-8e-9/10 0000009e->000000b4 Core Gen8 Mobile
       - KBL-U/Y      H0       6-8e-9/c0 0000009a->000000b4 Core Gen7 Mobile
       - CFL-U43e     D0       6-8e-a/c0 0000009e->000000b4 Core Gen8 Mobile
       - WHL-U        W0       6-8e-b/d0 000000a4->000000b8 Core Gen8 Mobile
       - WHL-U        V0       6-8e-d/94 000000b2->000000b8 Core Gen8 Mobile
       - KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a->000000b4 Core Gen7; Xeon E3 v6
       - CFL-H/S/E3   U0       6-9e-a/22 000000aa->000000b4 Core Gen8 Desktop,
         Mobile, Xeon E
       - CFL-S        B0       6-9e-b/02 000000aa->000000b4 Core Gen8
       - CFL-H/S      P0       6-9e-c/22 000000a2->000000ae Core Gen9
       - CFL-H        R0       6-9e-d/22 000000b0->000000b8 Core Gen9 Mobile
    
       This update was imported from the SUSE:SLE-15:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.0:
    
          zypper in -t patch openSUSE-2019-1402=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.0 (x86_64):
    
          ucode-intel-20190507-lp150.2.18.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2018-12126.html
       https://www.suse.com/security/cve/CVE-2018-12127.html
       https://www.suse.com/security/cve/CVE-2018-12130.html
       https://www.suse.com/security/cve/CVE-2019-11091.html
       https://bugzilla.suse.com/1111331
    
    -- 
    

    LinuxSecurity Poll

    In your opinion, what is the biggest advantage associated with choosing open-source software/technology?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote
    16
    radio
    [{"id":"61","title":"High levels of security","votes":"1","type":"x","order":"1","pct":16.67,"resources":[]},{"id":"62","title":"High levels of quality ","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"63","title":"Cost-effectiveness ","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"64","title":"Freedom and flexibility ","votes":"5","type":"x","order":"4","pct":83.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.