SUSE-SU-2019:1236-1: important: Security update for ucode-intel

sle-security-updates at sle-security-updates at
Tue May 14 16:09:14 MDT 2019

   SUSE Security Update: Security update for ucode-intel

Announcement ID:    SUSE-SU-2019:1236-1
Rating:             important
References:         #1111331 
Cross-References:   CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
Affected Products:
                    SUSE Linux Enterprise Module for Basesystem 15

   An update that fixes four vulnerabilities is now available.


   This update for ucode-intel fixes the following issues:

   This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

   Four new speculative execution information leak issues have been
   identified in Intel CPUs. (bsc#1111331)

   - CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
   - CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
   - CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
   - CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory

   These updates contain the CPU Microcode adjustments for the software

   For more information on this set of vulnerabilities, check out

   Release notes:

   - Processor             Identifier     Version       Products
   - Model        Stepping F-MO-S/PI      Old->New
   - ---- new platforms ----------------------------------------
   - CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
   - ---- updated platforms ------------------------------------
   - SNB          D2/G1/Q0 6-2a-7/12 0000002e->0000002f Core Gen2
   - IVB          E1/L1    6-3a-9/12 00000020->00000021 Core Gen3
   - HSW          C0       6-3c-3/32 00000025->00000027 Core Gen4
   - BDW-U/Y      E0/F0    6-3d-4/c0 0000002b->0000002d Core Gen5
   - IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e->0000042f Core Gen3 X Series;
     Xeon E5 v2
   - IVB-EX       D1       6-3e-7/ed 00000714->00000715 Xeon E7 v2
   - HSX-E/EP     Cx/M1    6-3f-2/6f 00000041->00000043 Core Gen4 X series;
     Xeon E5 v3
   - HSX-EX       E0       6-3f-4/80 00000013->00000014 Xeon E7 v3
   - HSW-U        C0/D0    6-45-1/72 00000024->00000025 Core Gen4
   - HSW-H        C0       6-46-1/32 0000001a->0000001b Core Gen4
   - BDW-H/E3     E0/G0    6-47-1/22 0000001e->00000020 Core Gen5
   - SKL-U/Y      D0/K1    6-4e-3/c0 000000c6->000000cc Core Gen6
   - SKX-SP       H0/M0/U0 6-55-4/b7 0200005a->0000005e Xeon Scalable
   - SKX-D        M1       6-55-4/b7 0200005a->0000005e Xeon D-21xx
   - BDX-DE       V1       6-56-2/10 00000019->0000001a Xeon D-1520/40
   - BDX-DE       V2/3     6-56-3/10 07000016->07000017 Xeon
     D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
   - BDX-DE       Y0       6-56-4/10 0f000014->0f000015 Xeon
   - BDX-NS       A0       6-56-5/10 0e00000c->0e00000d Xeon
   - APL          D0       6-5c-9/03 00000036->00000038 Pentium N/J4xxx,
     Celeron N/J3xxx, Atom x5/7-E39xx
   - SKL-H/S      R0/N0    6-5e-3/36 000000c6->000000cc Core Gen6; Xeon E3 v5
   - DNV          B0       6-5f-1/01 00000024->0000002e Atom Processor C
   - GLK          B0       6-7a-1/01 0000002c->0000002e Pentium Silver
     N/J5xxx, Celeron N/J4xxx
   - AML-Y22      H0       6-8e-9/10 0000009e->000000b4 Core Gen8 Mobile
   - KBL-U/Y      H0       6-8e-9/c0 0000009a->000000b4 Core Gen7 Mobile
   - CFL-U43e     D0       6-8e-a/c0 0000009e->000000b4 Core Gen8 Mobile
   - WHL-U        W0       6-8e-b/d0 000000a4->000000b8 Core Gen8 Mobile
   - WHL-U        V0       6-8e-d/94 000000b2->000000b8 Core Gen8 Mobile
   - KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a->000000b4 Core Gen7; Xeon E3 v6
   - CFL-H/S/E3   U0       6-9e-a/22 000000aa->000000b4 Core Gen8 Desktop,
     Mobile, Xeon E
   - CFL-S        B0       6-9e-b/02 000000aa->000000b4 Core Gen8
   - CFL-H/S      P0       6-9e-c/22 000000a2->000000ae Core Gen9
   - CFL-H        R0       6-9e-d/22 000000b0->000000b8 Core Gen9 Mobile

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Basesystem 15:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-1236=1

Package List:

   - SUSE Linux Enterprise Module for Basesystem 15 (x86_64):



More information about the sle-security-updates mailing list