[openSUSE-SU-2019:2504-1] Security update for ucode-intel
Severity
Important
Affected Packages
1
CVEs
2
Security update for ucode-intel
This update for ucode-intel fixes the following issues:
- Updated to 20191112 security release (bsc#1155988)
- Processor Identifier Version Products
- Model Stepping F-MO-S/PI Old->New
- ---- new platforms ----------------------------------------
- CML-U62 A0 6-a6-0/80 000000c6 Core Gen10 Mobile
- CNL-U D0 6-66-3/80 0000002a Core Gen8 Mobile
- SKX-SP B1 6-55-3/97 01000150 Xeon Scalable
- ICL U/Y D1 6-7e-5/80 00000046 Core Gen10 Mobile
- ---- updated platforms ------------------------------------
- SKL U/Y D0 6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile
- SKL H/S/E3 R0/N0 6-5e-3/36 000000cc->000000d4 Core Gen6
- AML-Y22 H0 6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile
- KBL-U/Y H0 6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile
- CFL-U43e D0 6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile
- WHL-U W0 6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile
- AML-Y V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
- CML-U42 V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
- WHL-U V0 6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile
- KBL-G/X H0 6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8
- KBL-H/S/E3 B0 6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6
- CFL-H/S/E3 U0 6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 000000b4->000000c6 Core Gen8
- CFL-H R0 6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile
- Includes security fixes for:
- CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
- CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
This update was imported from the SUSE:SLE-15:Update update project.
Package | Affected Version |
---|---|
pkg:rpm/opensuse/ucode-intel?arch=x86_64&distro=opensuse-leap-15.0 | < 20191112-lp150.2.30.1 |
- ID
- openSUSE-SU-2019:2504-1
- Severity
- important
- URL
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE/#M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE
- Published
-
2019-11-14T05:54:05
(4 years ago) - Modified
-
2019-11-14T05:54:05
(4 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2019-1318
- ALAS2-2019-1364
- ALPINE:CVE-2019-11135
- ALSA-2020:0279
- ASA-201911-14
- DSA-4564-1
- DSA-4565-1
- DSA-4602-1
- ELSA-2019-3832
- ELSA-2019-3834
- ELSA-2019-3836
- ELSA-2019-4836
- ELSA-2019-4837
- ELSA-2019-4838
- ELSA-2019-4839
- ELSA-2019-4850
- ELSA-2019-4854
- ELSA-2019-4855
- ELSA-2019-4867
- ELSA-2019-4868
- ELSA-2020-0279
- ELSA-2020-0366
- FEDORA-2019-021c968423
- FEDORA-2019-124a241044
- FEDORA-2019-1689d3fe07
- FEDORA-2019-2e12bd3a9a
- FEDORA-2019-34a75d7e61
- FEDORA-2019-376ec5c107
- FEDORA-2019-39e97683e8
- FEDORA-2019-3d7105bd2a
- FEDORA-2019-68d7f68507
- FEDORA-2019-6aad703290
- FEDORA-2019-7a3fc17778
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-b737d03b83
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-cbb732f760
- FEDORA-2020-203ffedeb5
- FEDORA-2020-227a4c0530
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-2d9a75fadb
- FEDORA-2020-3cd64d683c
- FEDORA-2020-8490989850
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-e328697628
- FEDORA-2020-f884f9dd7d
- FEDORA-2020-fe00e12580
- FREEBSD:FBE10A8A-05A1-11EA-9DFA-F8B156AC3FF9
- GLSA-202003-56
- MS:CVE-2019-11135
- openSUSE-SU-2019:2503-1
- openSUSE-SU-2019:2505-1
- openSUSE-SU-2019:2506-1
- openSUSE-SU-2019:2507-1
- openSUSE-SU-2019:2509-1
- openSUSE-SU-2019:2510-1
- openSUSE-SU-2019:2527-1
- openSUSE-SU-2019:2528-1
- openSUSE-SU-2019:2710-1
- RHSA-2019:3832
- RHSA-2019:3833
- RHSA-2019:3834
- RHSA-2019:3835
- RHSA-2019:3836
- RHSA-2019:3936
- RHSA-2020:0028
- RHSA-2020:0279
- RHSA-2020:0366
- RLSA-2020:0279
- SSA:2019-320-01
- SUSE-SU-2019:2946-1
- SUSE-SU-2019:2947-1
- SUSE-SU-2019:2948-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2951-1
- SUSE-SU-2019:2952-1
- SUSE-SU-2019:2953-1
- SUSE-SU-2019:2954-1
- SUSE-SU-2019:2955-1
- SUSE-SU-2019:2956-1
- SUSE-SU-2019:2957-1
- SUSE-SU-2019:2958-1
- SUSE-SU-2019:2959-1
- SUSE-SU-2019:2960-1
- SUSE-SU-2019:2961-1
- SUSE-SU-2019:2962-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2019:2986-1
- SUSE-SU-2019:2987-1
- SUSE-SU-2019:2988-1
- SUSE-SU-2019:3091-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3294-1
- SUSE-SU-2019:3295-1
- SUSE-SU-2019:3297-1
- SUSE-SU-2019:3340-1
- SUSE-SU-2019:3348-1
- SUSE-SU-2020:0093-1
- SUSE-SU-2020:0334-1
- SUSE-SU-2020:0388-1
- USN-4182-1
- USN-4182-2
- USN-4183-1
- USN-4184-1
- USN-4185-1
- USN-4185-2
- USN-4186-1
- USN-4186-2
- USN-4187-1
- USN-4188-1
- VMSA-2019-0020
- XSA-305
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2504-1.json | |
Suse | URL for openSUSE-SU-2019:2504-1 | https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE/#M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE | |
Suse | E-Mail link for openSUSE-SU-2019:2504-1 | https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE/#M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE | |
Bugzilla | SUSE Bug 1139073 | https://bugzilla.suse.com/1139073 | |
Bugzilla | SUSE Bug 1141035 | https://bugzilla.suse.com/1141035 | |
Bugzilla | SUSE Bug 1155988 | https://bugzilla.suse.com/1155988 | |
CVE | SUSE CVE CVE-2019-11135 page | https://www.suse.com/security/cve/CVE-2019-11135/ | |
CVE | SUSE CVE CVE-2019-11139 page | https://www.suse.com/security/cve/CVE-2019-11139/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/opensuse/ucode-intel?arch=x86_64&distro=opensuse-leap-15.0 | opensuse | ucode-intel | < 20191112-lp150.2.30.1 | opensuse-leap-15.0 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |