SUSE-SU-2019:1235-1: important: Security update for ucode-intel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue May 14 19:22:00 MDT 2019


   SUSE Security Update: Security update for ucode-intel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:1235-1
Rating:             important
References:         #1111331 
Cross-References:   CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
                    CVE-2019-11091
Affected Products:
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server for SAP 12-SP1
                    SUSE Linux Enterprise Server 12-SP4
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP1-LTSS
                    SUSE Linux Enterprise Server 12-LTSS
                    SUSE Linux Enterprise Desktop 12-SP4
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE Enterprise Storage 4
                    SUSE CaaS Platform 3.0
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for ucode-intel fixes the following issues:

   This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

   Four new speculative execution information leak issues have been
   identified in Intel CPUs. (bsc#1111331)

   - CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
   - CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
   - CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
   - CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory
     (MDSUM)

   These updates contain the CPU Microcode adjustments for the software
   mitigations.

   For more information on this set of vulnerabilities, check out
   https://www.suse.com/support/kb/doc/?id=7023736

   Release notes:

   - Processor             Identifier     Version       Products
   - Model        Stepping F-MO-S/PI      Old->New
   - ---- new platforms ----------------------------------------
   - CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
   - ---- updated platforms ------------------------------------
   - SNB          D2/G1/Q0 6-2a-7/12 0000002e->0000002f Core Gen2
   - IVB          E1/L1    6-3a-9/12 00000020->00000021 Core Gen3
   - HSW          C0       6-3c-3/32 00000025->00000027 Core Gen4
   - BDW-U/Y      E0/F0    6-3d-4/c0 0000002b->0000002d Core Gen5
   - IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e->0000042f Core Gen3 X Series;
     Xeon E5 v2
   - IVB-EX       D1       6-3e-7/ed 00000714->00000715 Xeon E7 v2
   - HSX-E/EP     Cx/M1    6-3f-2/6f 00000041->00000043 Core Gen4 X series;
     Xeon E5 v3
   - HSX-EX       E0       6-3f-4/80 00000013->00000014 Xeon E7 v3
   - HSW-U        C0/D0    6-45-1/72 00000024->00000025 Core Gen4
   - HSW-H        C0       6-46-1/32 0000001a->0000001b Core Gen4
   - BDW-H/E3     E0/G0    6-47-1/22 0000001e->00000020 Core Gen5
   - SKL-U/Y      D0/K1    6-4e-3/c0 000000c6->000000cc Core Gen6
   - SKX-SP       H0/M0/U0 6-55-4/b7 0200005a->0000005e Xeon Scalable
   - SKX-D        M1       6-55-4/b7 0200005a->0000005e Xeon D-21xx
   - BDX-DE       V1       6-56-2/10 00000019->0000001a Xeon D-1520/40
   - BDX-DE       V2/3     6-56-3/10 07000016->07000017 Xeon
     D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
   - BDX-DE       Y0       6-56-4/10 0f000014->0f000015 Xeon
     D-1557/59/67/71/77/81/87
   - BDX-NS       A0       6-56-5/10 0e00000c->0e00000d Xeon
     D-1513N/23/33/43/53
   - APL          D0       6-5c-9/03 00000036->00000038 Pentium N/J4xxx,
     Celeron N/J3xxx, Atom x5/7-E39xx
   - SKL-H/S      R0/N0    6-5e-3/36 000000c6->000000cc Core Gen6; Xeon E3 v5
   - DNV          B0       6-5f-1/01 00000024->0000002e Atom Processor C
     Series
   - GLK          B0       6-7a-1/01 0000002c->0000002e Pentium Silver
     N/J5xxx, Celeron N/J4xxx
   - AML-Y22      H0       6-8e-9/10 0000009e->000000b4 Core Gen8 Mobile
   - KBL-U/Y      H0       6-8e-9/c0 0000009a->000000b4 Core Gen7 Mobile
   - CFL-U43e     D0       6-8e-a/c0 0000009e->000000b4 Core Gen8 Mobile
   - WHL-U        W0       6-8e-b/d0 000000a4->000000b8 Core Gen8 Mobile
   - WHL-U        V0       6-8e-d/94 000000b2->000000b8 Core Gen8 Mobile
   - KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a->000000b4 Core Gen7; Xeon E3 v6
   - CFL-H/S/E3   U0       6-9e-a/22 000000aa->000000b4 Core Gen8 Desktop,
     Mobile, Xeon E
   - CFL-S        B0       6-9e-b/02 000000aa->000000b4 Core Gen8
   - CFL-H/S      P0       6-9e-c/22 000000a2->000000ae Core Gen9


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2019-1235=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-1235=1

   - SUSE Linux Enterprise Server for SAP 12-SP1:

      zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1235=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1235=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1235=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-1235=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-1235=1

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-1235=1

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2019-1235=1

   - SUSE Linux Enterprise Desktop 12-SP4:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1235=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1235=1

   - SUSE Enterprise Storage 4:

      zypper in -t patch SUSE-Storage-4-2019-1235=1

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE OpenStack Cloud 7 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server 12-SP4 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server 12-SP3 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Server 12-LTSS (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE Enterprise Storage 4 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1

   - SUSE CaaS Platform 3.0 (x86_64):

      ucode-intel-20190507-13.41.1
      ucode-intel-debuginfo-20190507-13.41.1
      ucode-intel-debugsource-20190507-13.41.1


References:

   https://www.suse.com/security/cve/CVE-2018-12126.html
   https://www.suse.com/security/cve/CVE-2018-12127.html
   https://www.suse.com/security/cve/CVE-2018-12130.html
   https://www.suse.com/security/cve/CVE-2019-11091.html
   https://bugzilla.suse.com/1111331



More information about the sle-security-updates mailing list