[SUSE-SU-2019:1296-1] Security update for ucode-intel
Security update for ucode-intel
This update for ucode-intel fixes the following issues:
ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)
---- new platforms ----------------------------------------
VLV C0 6-37-8/02 00000838 Atom Z series
VLV C0 6-37-8/0C 00000838 Celeron N2xxx, Pentium N35xx
VLV D0 6-37-9/0F 0000090c Atom E38xx
CHV C0 6-4c-3/01 00000368 Atom X series
CHV D0 6-4c-4/01 00000411 Atom X series
Readded Broadwell CPU ucode that was missing in last update:
BDX-ML B0/M0/R0 6-4f-1/ef 0b00002e->00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
Package | Affected Version |
---|---|
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=4 | < 20190514-13.44.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=3 | < 20190514-13.44.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=2 | < 20190514-13.44.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=1 | < 20190514-13.44.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12 | < 20190514-13.44.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sled-12&sp=4 | < 20190514-13.44.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sled-12&sp=3 | < 20190514-13.44.1 |
- ID
- SUSE-SU-2019:1296-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2019/suse-su-20191296-1/
- Published
-
2019-05-21T05:33:22
(5 years ago) - Modified
-
2019-05-21T05:33:22
(5 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2019-1205
- ALAS-2019-1260
- ALAS2-2019-1205
- ALAS2-2019-1274
- ALPINE:CVE-2018-12126
- ALPINE:CVE-2018-12127
- ALPINE:CVE-2018-12130
- ALPINE:CVE-2019-11091
- DSA-4444-1
- DSA-4447-1
- ELSA-2019-1167
- ELSA-2019-1168
- ELSA-2019-1169
- ELSA-2019-1175
- ELSA-2019-1177
- ELSA-2019-1178
- ELSA-2019-1180
- ELSA-2019-1181
- ELSA-2019-4628
- ELSA-2019-4629
- ELSA-2019-4630
- ELSA-2019-4636
- ELSA-2019-4637
- ELSA-2019-4640
- ELSA-2019-4643
- ELSA-2019-4669
- ELSA-2019-4672
- ELSA-2019-4675
- ELSA-2019-4702
- ELSA-2019-4714
- ELSA-2019-4732
- FEDORA-2019-021c968423
- FEDORA-2019-0332a96d31
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-1f5832fc0e
- FEDORA-2019-2e12bd3a9a
- FEDORA-2019-3d7105bd2a
- FEDORA-2019-41e28660ae
- FEDORA-2019-48b34fc991
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-52a8f5468e
- FEDORA-2019-5f105dd2b6
- FEDORA-2019-640f8d8dd1
- FEDORA-2019-6458474bf2
- FEDORA-2019-6817686c4d
- FEDORA-2019-69c132b061
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-6c3d89b3d0
- FEDORA-2019-6e146a714c
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-7ec378191e
- FEDORA-2019-8169b57f28
- FEDORA-2019-83858fc57b
- FEDORA-2019-865bb16900
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-899ef6056c
- FEDORA-2019-914542e05c
- FEDORA-2019-9210998aaa
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-a95015e60f
- FEDORA-2019-aeda234b68
- FEDORA-2019-b2dfb13daf
- FEDORA-2019-b318b2c6f3
- FEDORA-2019-c03eda3cc6
- FEDORA-2019-c36afa818c
- FEDORA-2019-cbb732f760
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2019-e6bf55e821
- FEDORA-2019-e9de40d53f
- FEDORA-2019-f40bd7826f
- FEDORA-2019-f910d35647
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-2d9a75fadb
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- FREEBSD:FBE10A8A-05A1-11EA-9DFA-F8B156AC3FF9
- GLSA-202003-56
- openSUSE-SU-2019:1402-1
- openSUSE-SU-2019:1403-1
- openSUSE-SU-2019:1404-1
- openSUSE-SU-2019:1405-1
- openSUSE-SU-2019:1468-1
- openSUSE-SU-2019:1505-1
- openSUSE-SU-2019:1805-1
- openSUSE-SU-2019:1806-1
- RHSA-2019:1167
- RHSA-2019:1168
- RHSA-2019:1169
- RHSA-2019:1174
- RHSA-2019:1175
- RHSA-2019:1176
- RHSA-2019:1177
- RHSA-2019:1178
- RHSA-2019:1180
- RHSA-2019:1181
- SUSE-SU-2019:1235-1
- SUSE-SU-2019:1236-1
- SUSE-SU-2019:1238-1
- SUSE-SU-2019:1239-1
- SUSE-SU-2019:1240-1
- SUSE-SU-2019:1241-1
- SUSE-SU-2019:1242-1
- SUSE-SU-2019:1243-1
- SUSE-SU-2019:1244-1
- SUSE-SU-2019:1245-1
- SUSE-SU-2019:1248-1
- SUSE-SU-2019:1268-1
- SUSE-SU-2019:1269-1
- SUSE-SU-2019:1272-1
- SUSE-SU-2019:1287-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2019:1313-1
- SUSE-SU-2019:1347-1
- SUSE-SU-2019:1348-1
- SUSE-SU-2019:1349-1
- SUSE-SU-2019:1356-1
- SUSE-SU-2019:1371-1
- SUSE-SU-2019:1423-1
- SUSE-SU-2019:1438-1
- SUSE-SU-2019:1452-1
- SUSE-SU-2019:1490-1
- SUSE-SU-2019:1547-1
- SUSE-SU-2019:1550-1
- SUSE-SU-2019:1909-1
- SUSE-SU-2019:1910-1
- SUSE-SU-2019:1954-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2753-1
- SUSE-SU-2019:2769-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- USN-3977-1
- USN-3977-2
- USN-3977-3
- USN-3978-1
- USN-3979-1
- USN-3980-1
- USN-3980-2
- USN-3981-1
- USN-3981-2
- USN-3982-1
- USN-3982-2
- USN-3983-1
- USN-3983-2
- USN-3984-1
- USN-3985-1
- USN-3985-2
- VMSA-2019-0008.2
- XSA-297
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1296-1.json | |
Suse | URL for SUSE-SU-2019:1296-1 | https://www.suse.com/support/update/announcement/2019/suse-su-20191296-1/ | |
Suse | E-Mail link for SUSE-SU-2019:1296-1 | https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html | |
Bugzilla | SUSE Bug 1111331 | https://bugzilla.suse.com/1111331 | |
CVE | SUSE CVE CVE-2018-12126 page | https://www.suse.com/security/cve/CVE-2018-12126/ | |
CVE | SUSE CVE CVE-2018-12127 page | https://www.suse.com/security/cve/CVE-2018-12127/ | |
CVE | SUSE CVE CVE-2018-12130 page | https://www.suse.com/security/cve/CVE-2018-12130/ | |
CVE | SUSE CVE CVE-2019-11091 page | https://www.suse.com/security/cve/CVE-2019-11091/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=4 | suse | ucode-intel | < 20190514-13.44.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=3 | suse | ucode-intel | < 20190514-13.44.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=2 | suse | ucode-intel | < 20190514-13.44.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12&sp=1 | suse | ucode-intel | < 20190514-13.44.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-12 | suse | ucode-intel | < 20190514-13.44.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sled-12&sp=4 | suse | ucode-intel | < 20190514-13.44.1 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sled-12&sp=3 | suse | ucode-intel | < 20190514-13.44.1 | sled-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |