File _patchinfo of Package patchinfo.7995

<patchinfo incident="7995">
  <issue tracker="bnc" id="1087083">VUL-0: CVE-2018-3640: V3a - Rogue Register Load</issue>
  <issue tracker="bnc" id="1087082">VUL-0: CVE-2018-3639:  V4 - Speculative Store Bypass aka "Memory Disambiguation"</issue>
  <issue tracker="bnc" id="1100147">VUL-0: ucode-intel,microcode_ctl: Intel firmware 20180703 released</issue>
  <issue tracker="cve" id="2018-3640"/>
  <issue tracker="cve" id="2018-3639"/>
  <category>security</category>
  <rating>important</rating>
  <packager>msmeissn</packager>
  <description>
This update for ucode-intel fixes the following issues:

The microcode bundles was updated to the 20180703 release

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx
</description>
  <summary>Security update for ucode-intel</summary>
</patchinfo>
openSUSE Build Service is sponsored by