[SUSE-SU-2018:2331-2] Security update to ucode-intel
Security update to ucode-intel
ucode-intel was updated to the 20180807 release.
For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx
NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx
BXT C0 6-5c-2/01 00000014 Atom T5500/5700
APL E0 6-5c-a/03 0000000c Atom x5-E39xx
DVN B0 6-5f-1/01 00000024 Atom C3xxx
---- updated platforms ------------------------------------
NHM-EP/WS D0 6-1a-5/03 00000019->0000001d Xeon E/L/X/W55xx
NHM B1 6-1e-5/13 00000007->0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
WSM B1 6-25-2/12 0000000e->00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
WSM K0 6-25-5/92 00000004->00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
SNB D2 6-2a-7/12 0000002d->0000002e Core Gen2; Xeon E3
WSM-EX A2 6-2f-2/05 00000037->0000003b Xeon E7
IVB E2 6-3a-9/12 0000001f->00000020 Core Gen3 Mobile
HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024->00000025 Core Gen4 Desktop; Xeon E3 v3
BDW-U/Y E/F 6-3d-4/c0 0000002a->0000002b Core Gen5 Mobile
HSW-ULT Cx/Dx 6-45-1/72 00000023->00000024 Core Gen4 Mobile and derived Pentium/Celeron
HSW-H Cx 6-46-1/32 00000019->0000001a Core Extreme i7-5xxxX
BDW-H/E3 E/G 6-47-1/22 0000001d->0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
SKL-U/Y D0 6-4e-3/c0 000000c2->000000c6 Core Gen6 Mobile
BDX-DE V1 6-56-2/10 00000015->00000017 Xeon D-1520/40
BDX-DE V2/3 6-56-3/10 07000012->07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
BDX-DE Y0 6-56-4/10 0f000011->0f000012 Xeon D-1557/59/67/71/77/81/87
APL D0 6-5c-9/03 0000002c->00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
SKL-H/S/E3 R0 6-5e-3/36 000000c2->000000c6 Core Gen6; Xeon E3 v5
Package | Affected Version |
---|---|
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=2 | < 20180807-13.29.1 |
- ID
- SUSE-SU-2018:2331-2
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2018/suse-su-20182331-2/
- Published
-
2018-10-18T12:49:10
(6 years ago) - Modified
-
2018-10-18T12:49:10
(6 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2018-1034
- ALAS-2018-1037
- ALAS-2018-1038
- ALAS-2018-1039
- ALAS-2018-1058
- ALAS2-2018-1033
- ALAS2-2018-1034
- ALAS2-2018-1037
- ALAS2-2018-1038
- ALAS2-2018-1039
- ALAS2-2018-1049
- ALAS2-2018-1058
- ALPINE:CVE-2018-3639
- ALPINE:CVE-2018-3646
- CISCO-SA-20180521-CPUSIDECHANNEL
- CISCO-SA-20180814-CPUSIDECHANNEL
- DSA-4210-1
- DSA-4273-1
- DSA-4273-2
- DSA-4274-1
- DSA-4279-1
- ELSA-2018-1629
- ELSA-2018-1632
- ELSA-2018-1633
- ELSA-2018-1647
- ELSA-2018-1648
- ELSA-2018-1649
- ELSA-2018-1650
- ELSA-2018-1651
- ELSA-2018-1660
- ELSA-2018-1669
- ELSA-2018-1854
- ELSA-2018-1965
- ELSA-2018-1997
- ELSA-2018-2001
- ELSA-2018-2162
- ELSA-2018-2164
- ELSA-2018-2384
- ELSA-2018-2390
- ELSA-2018-4114
- ELSA-2018-4126
- ELSA-2018-4195
- ELSA-2018-4196
- ELSA-2018-4198
- ELSA-2018-4235
- ELSA-2018-4285
- ELSA-2018-4289
- ELSA-2019-4531
- ELSA-2019-4585
- FEDORA-2018-0edb45d9db
- FEDORA-2018-1621b2204a
- FEDORA-2018-1a467757ce
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-2a0f8b2c9d
- FEDORA-2018-2b053454a4
- FEDORA-2018-2c6bd93875
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-2f6df9abfb
- FEDORA-2018-3857a8b41a
- FEDORA-2018-44f8a7454d
- FEDORA-2018-49bda79bd5
- FEDORA-2018-50075276e8
- FEDORA-2018-527698a904
- FEDORA-2018-537c8312fc
- FEDORA-2018-5521156807
- FEDORA-2018-59e4747e0f
- FEDORA-2018-6367a17aa3
- FEDORA-2018-683dfde81a
- FEDORA-2018-6c1be5e1c8
- FEDORA-2018-6e8c330d50
- FEDORA-2018-73dd8de892
- FEDORA-2018-74fb8b257b
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-8422d94975
- FEDORA-2018-8484550fff
- FEDORA-2018-915602df63
- FEDORA-2018-93af520878
- FEDORA-2018-93c2e74446
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9d0e4e40b5
- FEDORA-2018-9f02e5ed7b
- FEDORA-2018-9f4381d8c4
- FEDORA-2018-a0914af224
- FEDORA-2018-a7862a75f5
- FEDORA-2018-aec846c0ef
- FEDORA-2018-b57db4753c
- FEDORA-2018-b68776e5b0
- FEDORA-2018-b997780dca
- FEDORA-2018-bb7aab12cb
- FEDORA-2018-c0a1284064
- FEDORA-2018-c449dc1c9c
- FEDORA-2018-ca0e10fc6e
- FEDORA-2018-cc812838fb
- FEDORA-2018-d3cb6f113c
- FEDORA-2018-d77cc41f35
- FEDORA-2018-d82a45d9ab
- FEDORA-2018-d92fde52d7
- FEDORA-2018-db0d3e157e
- FEDORA-2018-ddbaca855e
- FEDORA-2018-e820fccd83
- FEDORA-2018-e8f793bbfc
- FEDORA-2018-f1b818a5c9
- FEDORA-2018-f20a0cead5
- FEDORA-2018-f8cba144ae
- FEDORA-2018-fe24359b69
- FEDORA-2019-16de0047d4
- FEDORA-2019-196ab64d65
- FEDORA-2019-1b986880ea
- FEDORA-2019-20a89ca9af
- FEDORA-2019-337484d88b
- FEDORA-2019-3854a1727e
- FEDORA-2019-3da64f3e61
- FEDORA-2019-3f9a71578d
- FEDORA-2019-4002b91800
- FEDORA-2019-509c133845
- FEDORA-2019-65c6d11eba
- FEDORA-2019-6e146a714c
- FEDORA-2019-7d3500d712
- FEDORA-2019-8f2b27efce
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-a87aba290f
- FEDORA-2019-bce6498890
- FEDORA-2019-c36afa818c
- FEDORA-2019-c701e6605a
- FEDORA-2019-ce2933b003
- FEDORA-2019-ec644ec323
- FREEBSD:2310B814-A652-11E8-805B-A4BADB2F4699
- GLSA-201810-06
- openSUSE-SU-2019:1438-1
- openSUSE-SU-2020:1325-1
- RHSA-2018:1629
- RHSA-2018:1630
- RHSA-2018:1632
- RHSA-2018:1633
- RHSA-2018:1647
- RHSA-2018:1648
- RHSA-2018:1649
- RHSA-2018:1650
- RHSA-2018:1651
- RHSA-2018:1660
- RHSA-2018:1669
- RHSA-2018:1854
- RHSA-2018:1965
- RHSA-2018:1997
- RHSA-2018:2001
- RHSA-2018:2003
- RHSA-2018:2162
- RHSA-2018:2164
- RHSA-2018:2384
- RHSA-2018:2390
- RHSA-2018:2395
- SSA:2018-208-01
- SUSE-SU-2018:1362-1
- SUSE-SU-2018:1362-2
- SUSE-SU-2018:1363-1
- SUSE-SU-2018:1366-1
- SUSE-SU-2018:1368-1
- SUSE-SU-2018:1374-1
- SUSE-SU-2018:1375-1
- SUSE-SU-2018:1376-1
- SUSE-SU-2018:1377-1
- SUSE-SU-2018:1377-2
- SUSE-SU-2018:1378-1
- SUSE-SU-2018:1386-1
- SUSE-SU-2018:1389-1
- SUSE-SU-2018:1452-1
- SUSE-SU-2018:1456-1
- SUSE-SU-2018:1475-1
- SUSE-SU-2018:1479-1
- SUSE-SU-2018:1582-1
- SUSE-SU-2018:1603-1
- SUSE-SU-2018:1614-1
- SUSE-SU-2018:1614-2
- SUSE-SU-2018:1658-1
- SUSE-SU-2018:1699-1
- SUSE-SU-2018:1699-2
- SUSE-SU-2018:1816-1
- SUSE-SU-2018:1846-1
- SUSE-SU-2018:1926-1
- SUSE-SU-2018:1935-1
- SUSE-SU-2018:1935-2
- SUSE-SU-2018:2076-1
- SUSE-SU-2018:2082-1
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2141-1
- SUSE-SU-2018:2304-1
- SUSE-SU-2018:2328-1
- SUSE-SU-2018:2331-1
- SUSE-SU-2018:2332-1
- SUSE-SU-2018:2335-1
- SUSE-SU-2018:2338-1
- SUSE-SU-2018:2340-1
- SUSE-SU-2018:2341-1
- SUSE-SU-2018:2342-1
- SUSE-SU-2018:2344-1
- SUSE-SU-2018:2344-2
- SUSE-SU-2018:2345-1
- SUSE-SU-2018:2346-1
- SUSE-SU-2018:2347-1
- SUSE-SU-2018:2348-1
- SUSE-SU-2018:2349-1
- SUSE-SU-2018:2350-1
- SUSE-SU-2018:2351-1
- SUSE-SU-2018:2352-1
- SUSE-SU-2018:2353-1
- SUSE-SU-2018:2354-1
- SUSE-SU-2018:2355-1
- SUSE-SU-2018:2356-1
- SUSE-SU-2018:2358-1
- SUSE-SU-2018:2359-1
- SUSE-SU-2018:2362-1
- SUSE-SU-2018:2363-1
- SUSE-SU-2018:2364-1
- SUSE-SU-2018:2366-1
- SUSE-SU-2018:2367-1
- SUSE-SU-2018:2368-1
- SUSE-SU-2018:2369-1
- SUSE-SU-2018:2374-1
- SUSE-SU-2018:2380-1
- SUSE-SU-2018:2381-1
- SUSE-SU-2018:2384-1
- SUSE-SU-2018:2387-1
- SUSE-SU-2018:2389-1
- SUSE-SU-2018:2391-1
- SUSE-SU-2018:2394-1
- SUSE-SU-2018:2401-1
- SUSE-SU-2018:2409-1
- SUSE-SU-2018:2410-1
- SUSE-SU-2018:2410-2
- SUSE-SU-2018:2413-1
- SUSE-SU-2018:2414-1
- SUSE-SU-2018:2416-1
- SUSE-SU-2018:2426-1
- SUSE-SU-2018:2450-1
- SUSE-SU-2018:2472-1
- SUSE-SU-2018:2473-1
- SUSE-SU-2018:2474-1
- SUSE-SU-2018:2480-1
- SUSE-SU-2018:2482-1
- SUSE-SU-2018:2483-1
- SUSE-SU-2018:2528-1
- SUSE-SU-2018:2556-1
- SUSE-SU-2018:2565-1
- SUSE-SU-2018:2596-1
- SUSE-SU-2018:2615-1
- SUSE-SU-2018:2637-1
- SUSE-SU-2018:2650-1
- SUSE-SU-2018:2963-1
- SUSE-SU-2018:2973-1
- SUSE-SU-2018:2973-2
- SUSE-SU-2018:3064-1
- SUSE-SU-2018:3064-2
- SUSE-SU-2018:3064-3
- SUSE-SU-2018:3490-1
- SUSE-SU-2018:3555-1
- SUSE-SU-2018:4300-1
- SUSE-SU-2019:0049-1
- SUSE-SU-2019:0049-2
- SUSE-SU-2019:0148-1
- SUSE-SU-2019:1211-1
- SUSE-SU-2019:1211-2
- SUSE-SU-2019:1219-1
- SUSE-SU-2019:2028-1
- SUSE-SU-2020:2540-1
- SUSE-SU-2020:2605-1
- SUSE-SU-2021:3007-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- USN-3651-1
- USN-3652-1
- USN-3653-1
- USN-3653-2
- USN-3654-1
- USN-3654-2
- USN-3655-1
- USN-3655-2
- USN-3679-1
- USN-3680-1
- USN-3740-1
- USN-3740-2
- USN-3741-1
- USN-3741-2
- USN-3742-1
- USN-3742-2
- USN-3756-1
- USN-3777-3
- USN-3823-1
- VU:180049
- VU:982149
- XSA-263
- XSA-273
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2331-2.json | |
Suse | URL for SUSE-SU-2018:2331-2 | https://www.suse.com/support/update/announcement/2018/suse-su-20182331-2/ | |
Suse | E-Mail link for SUSE-SU-2018:2331-2 | https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html | |
Bugzilla | SUSE Bug 1087082 | https://bugzilla.suse.com/1087082 | |
Bugzilla | SUSE Bug 1087083 | https://bugzilla.suse.com/1087083 | |
Bugzilla | SUSE Bug 1089343 | https://bugzilla.suse.com/1089343 | |
Bugzilla | SUSE Bug 1104134 | https://bugzilla.suse.com/1104134 | |
CVE | SUSE CVE CVE-2018-3639 page | https://www.suse.com/security/cve/CVE-2018-3639/ | |
CVE | SUSE CVE CVE-2018-3640 page | https://www.suse.com/security/cve/CVE-2018-3640/ | |
CVE | SUSE CVE CVE-2018-3646 page | https://www.suse.com/security/cve/CVE-2018-3646/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=2 | suse | ucode-intel | < 20180807-13.29.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |