Oval Definition:oval:org.opensuse.security:def:60284
Revision Date:2021-06-10Version:1
Title:Security update for ucode-intel (Important)
Description:

This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833) See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details. - Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details. - Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details. - Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details. - Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details. - Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details. - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details. - Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details. - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details. - Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details. - Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details. - Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |:---------------|:---------|:------------|:---------|:---------|:--------- | CLX-SP | A0 | 06-55-05/b7 | | 03000010 | Xeon Scalable Gen2 | ICX-SP | C0 | 06-6a-05/87 | | 0c0002f0 | Xeon Scalable Gen3 | ICX-SP | D0 | 06-6a-06/87 | | 0d0002a0 | Xeon Scalable Gen3 | SNR | B0 | 06-86-04/01 | | 0b00000f | Atom P59xxB | SNR | B1 | 06-86-05/01 | | 0b00000f | Atom P59xxB | TGL | B1 | 06-8c-01/80 | | 00000088 | Core Gen11 Mobile | TGL-R | C0 | 06-8c-02/c2 | | 00000016 | Core Gen11 Mobile | TGL-H | R0 | 06-8d-01/c2 | | 0000002c | Core Gen11 Mobile | EHL | B1 | 06-96-01/01 | | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E | JSL | A0/A1 | 06-9c-00/01 | | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105 | RKL-S | B0 | 06-a7-01/02 | | 00000040 | Core Gen11

- Updated platforms:

| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |:---------------|:---------|:------------|:---------|:---------|:--------- | HSX-E/EP | Cx/M1 | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3 | HSX-EX | E0 | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3 | SKL-U/Y | D0 | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile | SKL-U23e | K1 | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile | BDX-ML | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx | SKX-SP | B1 | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable | SKX-SP | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable | SKX-D | M1 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx | CLX-SP | B0 | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2 | CLX-SP | B1 | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2 | CPX-SP | A1 | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3 | BDX-DE | V2/V3 | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19 | BDX-DE | Y0 | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87 | BDX-NS | A0 | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53 | APL | D0 | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx | APL | E0 | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx | SKL-H/S | R0/N0 | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5 | DNV | B0 | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series | GLK | B0 | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx | GKL-R | R0 | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 | ICL-U/Y | D1 | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile | LKF | B2/B3 | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology | AML-Y22 | H0 | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile | KBL-U/Y | H0 | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile | CFL-U43e | D0 | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile | WHL-U | W0 | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile | AML-Y42 | V0 | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile | CML-Y42 | V0 | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile | WHL-U | V0 | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile | KBL-G/H/S/E3 | B0 | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6 | CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E | CFL-S | B0 | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8 | CFL-H/S | P0 | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9 | CFL-H | R0 | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile | CML-H | R1 | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile | CML-S62 | G1 | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10 | CML-S102 | Q0 | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10 | CML-U62 | A0 | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile | CML-U62 V2 | K0 | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
Family:unixClass:patch
Status:Reference(s):1097158
1097624
1098592
1109961
1121232
1121233
1121234
1121235
1138459
1141853
1157471
1159856
1159858
1159860
1160250
1160251
1160937
1169511
1173160
1173369
1174157
1179833
1179836
1179837
1179839
CVE-2010-2547
CVE-2012-4453
CVE-2012-5112
CVE-2012-5133
CVE-2013-2002
CVE-2013-2005
CVE-2013-4351
CVE-2013-4402
CVE-2014-1344
CVE-2014-1384
CVE-2014-1385
CVE-2014-1386
CVE-2014-1387
CVE-2014-1388
CVE-2014-1389
CVE-2014-1390
CVE-2014-1748
CVE-2014-1932
CVE-2014-3970
CVE-2014-4617
CVE-2015-1071
CVE-2015-1076
CVE-2015-1081
CVE-2015-1083
CVE-2015-1120
CVE-2015-1122
CVE-2015-1127
CVE-2015-1153
CVE-2015-1155
CVE-2015-1606
CVE-2015-1607
CVE-2015-2330
CVE-2015-3658
CVE-2015-3659
CVE-2015-3727
CVE-2015-3731
CVE-2015-3741
CVE-2015-3743
CVE-2015-3745
CVE-2015-3747
CVE-2015-3748
CVE-2015-3749
CVE-2015-3752
CVE-2015-5788
CVE-2015-5794
CVE-2015-5801
CVE-2015-5809
CVE-2015-5822
CVE-2015-5928
CVE-2016-8637
CVE-2018-0732
CVE-2018-11763
CVE-2018-20852
CVE-2019-10160
CVE-2019-15691
CVE-2019-15692
CVE-2019-15693
CVE-2019-15694
CVE-2019-15695
CVE-2019-19191
CVE-2019-5717
CVE-2019-5718
CVE-2019-5719
CVE-2019-5721
CVE-2020-10745
CVE-2020-14577
CVE-2020-14578
CVE-2020-14579
CVE-2020-14581
CVE-2020-14583
CVE-2020-14593
CVE-2020-14621
CVE-2020-15011
CVE-2020-24489
CVE-2020-24511
CVE-2020-24512
CVE-2020-24513
CVE-2020-2756
CVE-2020-2757
CVE-2020-2773
CVE-2020-2781
CVE-2020-2800
CVE-2020-2803
CVE-2020-2805
CVE-2020-2830
SUSE-SU-2018:1887-1
SUSE-SU-2018:3582-1
SUSE-SU-2019:0138-1
SUSE-SU-2019:2091-1
SUSE-SU-2020:0115-1
SUSE-SU-2020:0159-1
SUSE-SU-2020:1571-1
SUSE-SU-2020:2048-1
SUSE-SU-2020:2066-1
SUSE-SU-2020:2861-1
SUSE-SU-2021:1929-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server 12 SP4-ESPOS
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 8
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • libvirt-4.0.0-lp150.7.18 is installed
  • OR libvirt-admin-4.0.0-lp150.7.18 is installed
  • OR libvirt-client-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-config-network-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-config-nwfilter-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-interface-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-libxl-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-lxc-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-network-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-nodedev-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-qemu-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-secret-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-core-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-rbd-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-uml-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-driver-vbox-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-hooks-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-lxc-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-qemu-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-uml-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-vbox-4.0.0-lp150.7.18 is installed
  • OR libvirt-daemon-xen-4.0.0-lp150.7.18 is installed
  • OR libvirt-devel-4.0.0-lp150.7.18 is installed
  • OR libvirt-devel-32bit-4.0.0-lp150.7.18 is installed
  • OR libvirt-doc-4.0.0-lp150.7.18 is installed
  • OR libvirt-libs-4.0.0-lp150.7.18 is installed
  • OR libvirt-lock-sanlock-4.0.0-lp150.7.18 is installed
  • OR libvirt-nss-4.0.0-lp150.7.18 is installed
  • OR wireshark-plugin-libvirt-4.0.0-lp150.7.18 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • ibus-1.5.19-lp151.2.3 is installed
  • OR ibus-devel-1.5.19-lp151.2.3 is installed
  • OR ibus-gtk-1.5.19-lp151.2.3 is installed
  • OR ibus-gtk-32bit-1.5.19-lp151.2.3 is installed
  • OR ibus-gtk3-1.5.19-lp151.2.3 is installed
  • OR ibus-gtk3-32bit-1.5.19-lp151.2.3 is installed
  • OR ibus-lang-1.5.19-lp151.2.3 is installed
  • OR libibus-1_0-5-1.5.19-lp151.2.3 is installed
  • OR libibus-1_0-5-32bit-1.5.19-lp151.2.3 is installed
  • OR python-ibus-1.5.19-lp151.2.3 is installed
  • OR typelib-1_0-IBus-1_0-1.5.19-lp151.2.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • dracut-044-113 is installed
  • OR dracut-fips-044-113 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • libshibsp-lite6-2.5.5-6.6 is installed
  • OR libshibsp6-2.5.5-6.6 is installed
  • OR shibboleth-sp-2.5.5-6.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND ucode-intel-20191112a-13.56 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND mailman-2.1.17-3.23 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • libsqlite3-0-3.8.10.2-9.6 is installed
  • OR libsqlite3-0-32bit-3.8.10.2-9.6 is installed
  • OR sqlite3-3.8.10.2-9.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND chrony-2.3-3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4-ESPOS is installed
  • AND Package Information
  • tomcat-9.0.36-3.45 is installed
  • OR tomcat-admin-webapps-9.0.36-3.45 is installed
  • OR tomcat-docs-webapp-9.0.36-3.45 is installed
  • OR tomcat-el-3_0-api-9.0.36-3.45 is installed
  • OR tomcat-javadoc-9.0.36-3.45 is installed
  • OR tomcat-jsp-2_3-api-9.0.36-3.45 is installed
  • OR tomcat-lib-9.0.36-3.45 is installed
  • OR tomcat-servlet-4_0-api-9.0.36-3.45 is installed
  • OR tomcat-webapps-9.0.36-3.45 is installed
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12 SP5 is installed
  • AND ucode-intel-20210525-3.35.1 is installed
  • OR Package Information
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5 is installed
  • AND ucode-intel-20210525-3.35.1 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND Package Information
  • libpython2_7-1_0-2.7.13-28.31 is installed
  • OR libpython2_7-1_0-32bit-2.7.13-28.31 is installed
  • OR python-2.7.13-28.31 is installed
  • OR python-32bit-2.7.13-28.31 is installed
  • OR python-base-2.7.13-28.31 is installed
  • OR python-base-32bit-2.7.13-28.31 is installed
  • OR python-curses-2.7.13-28.31 is installed
  • OR python-demo-2.7.13-28.31 is installed
  • OR python-devel-2.7.13-28.31 is installed
  • OR python-doc-2.7.13-28.31 is installed
  • OR python-doc-pdf-2.7.13-28.31 is installed
  • OR python-gdbm-2.7.13-28.31 is installed
  • OR python-idle-2.7.13-28.31 is installed
  • OR python-tk-2.7.13-28.31 is installed
  • OR python-xml-2.7.13-28.31 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 9 is installed
  • AND Package Information
  • java-1_7_1-ibm-1.7.1_sr4.70-38.56 is installed
  • OR java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56 is installed
  • OR java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56 is installed
  • OR java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56 is installed
  • OR java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • java-1_7_0-openjdk-1.7.0.271-43.41 is installed
  • OR java-1_7_0-openjdk-demo-1.7.0.271-43.41 is installed
  • OR java-1_7_0-openjdk-devel-1.7.0.271-43.41 is installed
  • OR java-1_7_0-openjdk-headless-1.7.0.271-43.41 is installed
  • BACK