Security update for ucode-intel

SUSE Security Update: Security update for ucode-intel
Announcement ID: SUSE-SU-2019:1313-1
Rating: important
References: #1111331
Cross-References: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
Affected Products:
  • SUSE Linux Enterprise Module for Basesystem 15

An update that fixes four vulnerabilities is now available.

Description:

This update for ucode-intel fixes the following issues:
The Intel CPU Microcode was updated to the official QSR 2019.1 Microcode release (bsc#1111331 CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)
---- new platforms ---------------------------------------- VLV C0 6-37-8/02 00000838 Atom Z series VLV C0 6-37-8/0C 00000838 Celeron N2xxx, Pentium N35xx VLV D0 6-37-9/0F 0000090c Atom E38xx CHV C0 6-4c-3/01 00000368 Atom X series CHV D0 6-4c-4/01 00000411 Atom X series
Readded missing in last update:
BDX-ML B0/M0/R0 6-4f-1/ef 0b00002e->00000036 Xeon E5/E7 v4; Core i7-69xx/68xx

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Basesystem 15:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-1313=1

Package List:

  • SUSE Linux Enterprise Module for Basesystem 15 (x86_64):
    • ucode-intel-20190514-3.19.1

References: