Revision Date: | 2021-06-10 | Version: | 1 |
Title: | Security update for ucode-intel (Important) |
Description: |
This update for ucode-intel fixes the following issues:
Updated to Intel CPU Microcode 20210608 release.
- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833) See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html
- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)
See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)
- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)
See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)
- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)
See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html
Other fixes:
- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details. - Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details. - Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details. - Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details. - Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details. - Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details. - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details. - Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details. - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details. - Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details. - Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details. - Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.
- New platforms:
| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |:---------------|:---------|:------------|:---------|:---------|:--------- | CLX-SP | A0 | 06-55-05/b7 | | 03000010 | Xeon Scalable Gen2 | ICX-SP | C0 | 06-6a-05/87 | | 0c0002f0 | Xeon Scalable Gen3 | ICX-SP | D0 | 06-6a-06/87 | | 0d0002a0 | Xeon Scalable Gen3 | SNR | B0 | 06-86-04/01 | | 0b00000f | Atom P59xxB | SNR | B1 | 06-86-05/01 | | 0b00000f | Atom P59xxB | TGL | B1 | 06-8c-01/80 | | 00000088 | Core Gen11 Mobile | TGL-R | C0 | 06-8c-02/c2 | | 00000016 | Core Gen11 Mobile | TGL-H | R0 | 06-8d-01/c2 | | 0000002c | Core Gen11 Mobile | EHL | B1 | 06-96-01/01 | | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E | JSL | A0/A1 | 06-9c-00/01 | | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105 | RKL-S | B0 | 06-a7-01/02 | | 00000040 | Core Gen11
- Updated platforms:
| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |:---------------|:---------|:------------|:---------|:---------|:--------- | HSX-E/EP | Cx/M1 | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3 | HSX-EX | E0 | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3 | SKL-U/Y | D0 | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile | SKL-U23e | K1 | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile | BDX-ML | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx | SKX-SP | B1 | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable | SKX-SP | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable | SKX-D | M1 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx | CLX-SP | B0 | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2 | CLX-SP | B1 | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2 | CPX-SP | A1 | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3 | BDX-DE | V2/V3 | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19 | BDX-DE | Y0 | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87 | BDX-NS | A0 | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53 | APL | D0 | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx | APL | E0 | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx | SKL-H/S | R0/N0 | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5 | DNV | B0 | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series | GLK | B0 | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx | GKL-R | R0 | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 | ICL-U/Y | D1 | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile | LKF | B2/B3 | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology | AML-Y22 | H0 | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile | KBL-U/Y | H0 | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile | CFL-U43e | D0 | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile | WHL-U | W0 | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile | AML-Y42 | V0 | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile | CML-Y42 | V0 | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile | WHL-U | V0 | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile | KBL-G/H/S/E3 | B0 | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6 | CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E | CFL-S | B0 | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8 | CFL-H/S | P0 | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9 | CFL-H | R0 | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile | CML-H | R1 | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile | CML-S62 | G1 | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10 | CML-S102 | Q0 | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10 | CML-U62 | A0 | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile | CML-U62 V2 | K0 | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1097158 1097624 1098592 1109961 1121232 1121233 1121234 1121235 1138459 1141853 1157471 1159856 1159858 1159860 1160250 1160251 1160937 1169511 1173160 1173369 1174157 1179833 1179836 1179837 1179839 CVE-2010-2547 CVE-2012-4453 CVE-2012-5112 CVE-2012-5133 CVE-2013-2002 CVE-2013-2005 CVE-2013-4351 CVE-2013-4402 CVE-2014-1344 CVE-2014-1384 CVE-2014-1385 CVE-2014-1386 CVE-2014-1387 CVE-2014-1388 CVE-2014-1389 CVE-2014-1390 CVE-2014-1748 CVE-2014-1932 CVE-2014-3970 CVE-2014-4617 CVE-2015-1071 CVE-2015-1076 CVE-2015-1081 CVE-2015-1083 CVE-2015-1120 CVE-2015-1122 CVE-2015-1127 CVE-2015-1153 CVE-2015-1155 CVE-2015-1606 CVE-2015-1607 CVE-2015-2330 CVE-2015-3658 CVE-2015-3659 CVE-2015-3727 CVE-2015-3731 CVE-2015-3741 CVE-2015-3743 CVE-2015-3745 CVE-2015-3747 CVE-2015-3748 CVE-2015-3749 CVE-2015-3752 CVE-2015-5788 CVE-2015-5794 CVE-2015-5801 CVE-2015-5809 CVE-2015-5822 CVE-2015-5928 CVE-2016-8637 CVE-2018-0732 CVE-2018-11763 CVE-2018-20852 CVE-2019-10160 CVE-2019-15691 CVE-2019-15692 CVE-2019-15693 CVE-2019-15694 CVE-2019-15695 CVE-2019-19191 CVE-2019-5717 CVE-2019-5718 CVE-2019-5719 CVE-2019-5721 CVE-2020-10745 CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581 CVE-2020-14583 CVE-2020-14593 CVE-2020-14621 CVE-2020-15011 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 CVE-2020-2756 CVE-2020-2757 CVE-2020-2773 CVE-2020-2781 CVE-2020-2800 CVE-2020-2803 CVE-2020-2805 CVE-2020-2830 SUSE-SU-2018:1887-1 SUSE-SU-2018:3582-1 SUSE-SU-2019:0138-1 SUSE-SU-2019:2091-1 SUSE-SU-2020:0115-1 SUSE-SU-2020:0159-1 SUSE-SU-2020:1571-1 SUSE-SU-2020:2048-1 SUSE-SU-2020:2066-1 SUSE-SU-2020:2861-1 SUSE-SU-2021:1929-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 12 SP4-ESPOS SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server for SAP Applications 12 SP5 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
libvirt-4.0.0-lp150.7.18 is installed
OR libvirt-admin-4.0.0-lp150.7.18 is installed
OR libvirt-client-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-config-network-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-config-nwfilter-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-interface-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-libxl-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-lxc-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-network-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-nodedev-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-qemu-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-secret-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-core-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-rbd-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-uml-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-driver-vbox-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-hooks-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-lxc-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-qemu-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-uml-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-vbox-4.0.0-lp150.7.18 is installed
OR libvirt-daemon-xen-4.0.0-lp150.7.18 is installed
OR libvirt-devel-4.0.0-lp150.7.18 is installed
OR libvirt-devel-32bit-4.0.0-lp150.7.18 is installed
OR libvirt-doc-4.0.0-lp150.7.18 is installed
OR libvirt-libs-4.0.0-lp150.7.18 is installed
OR libvirt-lock-sanlock-4.0.0-lp150.7.18 is installed
OR libvirt-nss-4.0.0-lp150.7.18 is installed
OR wireshark-plugin-libvirt-4.0.0-lp150.7.18 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
ibus-1.5.19-lp151.2.3 is installed
OR ibus-devel-1.5.19-lp151.2.3 is installed
OR ibus-gtk-1.5.19-lp151.2.3 is installed
OR ibus-gtk-32bit-1.5.19-lp151.2.3 is installed
OR ibus-gtk3-1.5.19-lp151.2.3 is installed
OR ibus-gtk3-32bit-1.5.19-lp151.2.3 is installed
OR ibus-lang-1.5.19-lp151.2.3 is installed
OR libibus-1_0-5-1.5.19-lp151.2.3 is installed
OR libibus-1_0-5-32bit-1.5.19-lp151.2.3 is installed
OR python-ibus-1.5.19-lp151.2.3 is installed
OR typelib-1_0-IBus-1_0-1.5.19-lp151.2.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
dracut-044-113 is installed
OR dracut-fips-044-113 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
libshibsp-lite6-2.5.5-6.6 is installed
OR libshibsp6-2.5.5-6.6 is installed
OR shibboleth-sp-2.5.5-6.6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND ucode-intel-20191112a-13.56 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND mailman-2.1.17-3.23 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
libsqlite3-0-3.8.10.2-9.6 is installed
OR libsqlite3-0-32bit-3.8.10.2-9.6 is installed
OR sqlite3-3.8.10.2-9.6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND chrony-2.3-3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4-ESPOS is installed
AND Package Information
tomcat-9.0.36-3.45 is installed
OR tomcat-admin-webapps-9.0.36-3.45 is installed
OR tomcat-docs-webapp-9.0.36-3.45 is installed
OR tomcat-el-3_0-api-9.0.36-3.45 is installed
OR tomcat-javadoc-9.0.36-3.45 is installed
OR tomcat-jsp-2_3-api-9.0.36-3.45 is installed
OR tomcat-lib-9.0.36-3.45 is installed
OR tomcat-servlet-4_0-api-9.0.36-3.45 is installed
OR tomcat-webapps-9.0.36-3.45 is installed
|
Definition Synopsis |
Release Information
SUSE Linux Enterprise Server 12 SP5 is installed
AND ucode-intel-20210525-3.35.1 is installed
OR Package Information
SUSE Linux Enterprise Server for SAP Applications 12 SP5 is installed
AND ucode-intel-20210525-3.35.1 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND Package Information
libpython2_7-1_0-2.7.13-28.31 is installed
OR libpython2_7-1_0-32bit-2.7.13-28.31 is installed
OR python-2.7.13-28.31 is installed
OR python-32bit-2.7.13-28.31 is installed
OR python-base-2.7.13-28.31 is installed
OR python-base-32bit-2.7.13-28.31 is installed
OR python-curses-2.7.13-28.31 is installed
OR python-demo-2.7.13-28.31 is installed
OR python-devel-2.7.13-28.31 is installed
OR python-doc-2.7.13-28.31 is installed
OR python-doc-pdf-2.7.13-28.31 is installed
OR python-gdbm-2.7.13-28.31 is installed
OR python-idle-2.7.13-28.31 is installed
OR python-tk-2.7.13-28.31 is installed
OR python-xml-2.7.13-28.31 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 9 is installed
AND Package Information
java-1_7_1-ibm-1.7.1_sr4.70-38.56 is installed
OR java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56 is installed
OR java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56 is installed
OR java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56 is installed
OR java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
java-1_7_0-openjdk-1.7.0.271-43.41 is installed
OR java-1_7_0-openjdk-demo-1.7.0.271-43.41 is installed
OR java-1_7_0-openjdk-devel-1.7.0.271-43.41 is installed
OR java-1_7_0-openjdk-headless-1.7.0.271-43.41 is installed
|