<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ucode-intel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:1600-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-06-10T10:31:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-06-10T10:31:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-06-10T10:31:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ucode-intel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES15-SAP-Azure-LI-BYOS-Production-2020-1600,Image SLES15-SAP-Azure-VLI-BYOS-Production-2020-1600,SUSE-2020-1600,SUSE-SLE-Product-HPC-15-2020-1600,SUSE-SLE-Product-SLES_SAP-15-2020-1600</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201600-1/</URL>
      <Description>Link for SUSE-SU-2020:1600-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:1600-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154824</URL>
      <Description>SUSE Bug 1154824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156353</URL>
      <Description>SUSE Bug 1156353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172466</URL>
      <Description>SUSE Bug 1172466</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0543/</URL>
      <Description>SUSE CVE CVE-2020-0543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0548/</URL>
      <Description>SUSE CVE CVE-2020-0548 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-0549/</URL>
      <Description>SUSE CVE CVE-2020-0549 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES15-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES15-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES15-SAP-Azure-LI-BYOS-Production">Image SLES15-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES15-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES15-SAP-Azure-VLI-BYOS-Production">Image SLES15-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15">SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15">SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15" CPE="cpe:/o:suse:sles_sap:15">SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ucode-intel-20200602-3.43.1">
      <FullProductName ProductID="ucode-intel-20200602-3.43.1">ucode-intel-20200602-3.43.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ucode-intel-20200602-3.43.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES15-SAP-Azure-LI-BYOS-Production:ucode-intel-20200602-3.43.1">ucode-intel-20200602-3.43.1 as a component of Image SLES15-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20200602-3.43.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES15-SAP-Azure-VLI-BYOS-Production:ucode-intel-20200602-3.43.1">ucode-intel-20200602-3.43.1 as a component of Image SLES15-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20200602-3.43.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1">ucode-intel-20200602-3.43.1 as a component of SUSE Linux Enterprise High Performance Computing 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20200602-3.43.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1">ucode-intel-20200602-3.43.1 as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20200602-3.43.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1">ucode-intel-20200602-3.43.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-0543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SAP-Azure-LI-BYOS-Production:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>Image SLES15-SAP-Azure-VLI-BYOS-Production:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201600-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0543.html</URL>
        <Description>CVE-2020-0543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154824</URL>
        <Description>SUSE Bug 1154824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172205</URL>
        <Description>SUSE Bug 1172205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172206</URL>
        <Description>SUSE Bug 1172206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172207</URL>
        <Description>SUSE Bug 1172207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172770</URL>
        <Description>SUSE Bug 1172770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-0548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SAP-Azure-LI-BYOS-Production:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>Image SLES15-SAP-Azure-VLI-BYOS-Production:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201600-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0548.html</URL>
        <Description>CVE-2020-0548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156353</URL>
        <Description>SUSE Bug 1156353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2020-0549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SAP-Azure-LI-BYOS-Production:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>Image SLES15-SAP-Azure-VLI-BYOS-Production:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20201600-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-0549.html</URL>
        <Description>CVE-2020-0549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156353</URL>
        <Description>SUSE Bug 1156353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
