SUSE-SU-2019:14133-1: important: Security update for microcode_ctl

sle-security-updates at sle-security-updates at
Tue Jul 23 07:15:56 MDT 2019

   SUSE Security Update: Security update for microcode_ctl

Announcement ID:    SUSE-SU-2019:14133-1
Rating:             important
References:         #1111331 #1141977 
Cross-References:   CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3

   An update that fixes four vulnerabilities is now available.


   This update for microcode_ctl fixes the following issues:

   This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

   Four new speculative execution information leak issues have been
   identified in Intel CPUs. (bsc#1111331)

   - CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
   - CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
   - CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
   - CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory

   These updates contain the CPU Microcode adjustments for the software

   For more information on this set of vulnerabilities, check out

   Release notes:

   ---- updated platforms ------------------------------------ SNB-E/EN/EP
    C1/M0    6-2d-6/6d 0000061d->0000061f Xeon E3/E5, Core X SNB-E/EN/EP
    C2/M1    6-2d-7/6d 00000714->00000718 Xeon E3/E5, Core X

   ---- new platforms ---------------------------------------- VLV
    C0       6-37-8/02           00000838 Atom Z series VLV          C0
    6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx VLV
    D0       6-37-9/0F           0000090c Atom E38xx CHV          C0
    6-4c-3/01           00000368 Atom X series CHV          D0
    6-4c-4/01           00000411 Atom X series

   Readded what missing in last update: BDX-ML       B0/M0/R0 6-4f-1/ef
   0b00002e->00000036 Xeon E5/E7 v4; Core i7-69xx/68xx

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-microcode_ctl-14133=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-microcode_ctl-14133=1

Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):


   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):



More information about the sle-security-updates mailing list