<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ucode-intel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1904-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-07-06T15:06:49Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-07-06T15:06:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-07-06T15:06:49Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ucode-intel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
  
This update for ucode-intel fixes the following issues:

The microcode bundles was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&amp;gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&amp;gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&amp;gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&amp;gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&amp;gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&amp;gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&amp;gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&amp;gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&amp;gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&amp;gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1904-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ucode-intel-20180703-25.1">
      <FullProductName ProductID="ucode-intel-20180703-25.1">ucode-intel-20180703-25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ucode-intel-blob-20180703-25.1">
      <FullProductName ProductID="ucode-intel-blob-20180703-25.1">ucode-intel-blob-20180703-25.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ucode-intel-20180703-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ucode-intel-20180703-25.1">ucode-intel-20180703-25.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-blob-20180703-25.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ucode-intel-blob-20180703-25.1">ucode-intel-blob-20180703-25.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.</Note>
    </Notes>
    <CVE>CVE-2018-3639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ucode-intel-20180703-25.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ucode-intel-blob-20180703-25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3639.html</URL>
        <Description>CVE-2018-3639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085235</URL>
        <Description>SUSE Bug 1085235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085308</URL>
        <Description>SUSE Bug 1085308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087082</URL>
        <Description>SUSE Bug 1087082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102640</URL>
        <Description>SUSE Bug 1102640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105412</URL>
        <Description>SUSE Bug 1105412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113769</URL>
        <Description>SUSE Bug 1113769</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.</Note>
    </Notes>
    <CVE>CVE-2018-3640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ucode-intel-20180703-25.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ucode-intel-blob-20180703-25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3640.html</URL>
        <Description>CVE-2018-3640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074701</URL>
        <Description>SUSE Bug 1074701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087078</URL>
        <Description>SUSE Bug 1087078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087083</URL>
        <Description>SUSE Bug 1087083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094912</URL>
        <Description>SUSE Bug 1094912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100394</URL>
        <Description>SUSE Bug 1100394</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
