<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ucode-intel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:1926-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-07-11T13:55:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-07-11T13:55:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-07-11T13:55:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ucode-intel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for ucode-intel fixes the following issues:

The microcode bundles was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Basesystem-15-2018-1299</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181926-1/</URL>
      <Description>Link for SUSE-SU-2018:1926-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:1926-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1087082</URL>
      <Description>SUSE Bug 1087082</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1087083</URL>
      <Description>SUSE Bug 1087083</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1100147</URL>
      <Description>SUSE Bug 1100147</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3639/</URL>
      <Description>SUSE CVE CVE-2018-3639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3640/</URL>
      <Description>SUSE CVE CVE-2018-3640 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15" CPE="cpe:/o:suse:sle-module-basesystem:15">SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ucode-intel-20180703-3.3.1">
      <FullProductName ProductID="ucode-intel-20180703-3.3.1">ucode-intel-20180703-3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ucode-intel-20180703-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1">ucode-intel-20180703-3.3.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181926-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092631</URL>
        <Description>SUSE Bug 1092631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092885</URL>
        <Description>SUSE Bug 1092885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111963</URL>
        <Description>SUSE Bug 1111963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172781</URL>
        <Description>SUSE Bug 1172781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172782</URL>
        <Description>SUSE Bug 1172782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172783</URL>
        <Description>SUSE Bug 1172783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173489</URL>
        <Description>SUSE Bug 1173489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.</Note>
    </Notes>
    <CVE>CVE-2018-3640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181926-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3640.html</URL>
        <Description>CVE-2018-3640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087083</URL>
        <Description>SUSE Bug 1087083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098813</URL>
        <Description>SUSE Bug 1098813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175912</URL>
        <Description>SUSE Bug 1175912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
