SUSE-SU-2019:1313-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20191313-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:1313-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:1313-1
Related
Published
2019-05-22T11:06:39Z
Modified
2019-05-22T11:06:39Z
Summary
Security update for ucode-intel
Details

This update for ucode-intel fixes the following issues:

The Intel CPU Microcode was updated to the official QSR 2019.1 Microcode release (bsc#1111331 CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ---------------------------------------- VLV C0 6-37-8/02 00000838 Atom Z series VLV C0 6-37-8/0C 00000838 Celeron N2xxx, Pentium N35xx VLV D0 6-37-9/0F 0000090c Atom E38xx CHV C0 6-4c-3/01 00000368 Atom X series CHV D0 6-4c-4/01 00000411 Atom X series

Readded missing in last update:

BDX-ML B0/M0/R0 6-4f-1/ef 0b00002e->00000036 Xeon E5/E7 v4; Core i7-69xx/68xx

References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 / ucode-intel

Package

Name
ucode-intel
Purl
purl:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20190514-3.19.1

Ecosystem specific

{
    "binaries": [
        {
            "ucode-intel": "20190514-3.19.1"
        }
    ]
}