Lucene search

K
openvasCopyright (C) 2019 Greenbone Networks GmbHOPENVAS:1361412562310852504
HistoryMay 17, 2019 - 12:00 a.m.

openSUSE: Security Advisory for ucode-intel (openSUSE-SU-2019:1402-1)

2019-05-1700:00:00
Copyright (C) 2019 Greenbone Networks GmbH
plugins.openvas.org
55

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.2%

The remote host is missing an update for the

# Copyright (C) 2019 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.852504");
  script_version("2023-10-12T05:05:32+0000");
  script_cve_id("CVE-2018-12126", "CVE-2018-12127", "CVE-2018-12130", "CVE-2019-11091");
  script_tag(name:"cvss_base", value:"4.7");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:N/A:N");
  script_tag(name:"last_modification", value:"2023-10-12 05:05:32 +0000 (Thu, 12 Oct 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-06-11 16:29:00 +0000 (Tue, 11 Jun 2019)");
  script_tag(name:"creation_date", value:"2019-05-17 02:00:58 +0000 (Fri, 17 May 2019)");
  script_name("openSUSE: Security Advisory for ucode-intel (openSUSE-SU-2019:1402-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2019 Greenbone Networks GmbH");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=openSUSELeap15\.0");

  script_xref(name:"openSUSE-SU", value:"2019:1402-1");
  script_xref(name:"URL", value:"https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'ucode-intel'
  package(s) announced via the openSUSE-SU-2019:1402-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for ucode-intel fixes the following issues:

  This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

  Four new speculative execution information leak issues have been
  identified in Intel CPUs. (bsc#1111331)

  - CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)

  - CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)

  - CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)

  - CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory
  (MDSUM)

  These updates contain the CPU Microcode adjustments for the software
  mitigations.


  Release notes:

  - Processor             Identifier     Version       Products

  - Model        Stepping F-MO-S/PI      Old->New

  - ---- new platforms ----------------------------------------

  - CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2

  - ---- updated platforms ------------------------------------

  - SNB          D2/G1/Q0 6-2a-7/12 0000002e->0000002f Core Gen2

  - IVB          E1/L1    6-3a-9/12 00000020->00000021 Core Gen3

  - HSW          C0       6-3c-3/32 00000025->00000027 Core Gen4

  - BDW-U/Y      E0/F0    6-3d-4/c0 0000002b->0000002d Core Gen5

  - IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e->0000042f Core Gen3 X Series,
  Xeon E5 v2

  - IVB-EX       D1       6-3e-7/ed 00000714->00000715 Xeon E7 v2

  - HSX-E/EP     Cx/M1    6-3f-2/6f 00000041->00000043 Core Gen4 X series,
  Xeon E5 v3

  - HSX-EX       E0       6-3f-4/80 00000013->00000014 Xeon E7 v3

  - HSW-U        C0/D0    6-45-1/72 00000024->00000025 Core Gen4

  - HSW-H        C0       6-46-1/32 0000001a->0000001b Core Gen4

  - BDW-H/E3     E0/G0    6-47-1/22 0000001e->00000020 Core Gen5

  - SKL-U/Y      D0/K1    6-4e-3/c0 000000c6->000000cc Core Gen6

  - SKX-SP       H0/M0/U0 6-55-4/b7 0200005a->0000005e Xeon Scalable

  - SKX-D        M1       6-55-4/b7 0200005a->0000005e Xeon D-21xx

  - BDX-DE       V1       6-56-2/10 00000019->0000001a Xeon D-1520/40

  - BDX-DE       V2/3     6-56-3/10 07000016->07000017 Xeon
  D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19

  - BDX-DE       Y0       6-56-4/10 0f000014->0f000015 Xeon
  D-1557/59/67/71/77/81/87

  - BDX-NS       A0       6-56-5/10 0e00000c->0e00000d Xeon
  D-1513N/23/33/43/53

  - APL          D0       6-5c-9/03 00000036->00000038 Pentium N/J4xxx,
  Celeron N/J3xxx, Atom x5/7-E39xx

  - SKL-H/S      R0/N0    6-5e-3/36 0000 ...

  Description truncated. Please see the references for more information.");

  script_tag(name:"affected", value:"'ucode-intel' package(s) on openSUSE Leap 15.0.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "openSUSELeap15.0") {

  if(!isnull(res = isrpmvuln(pkg:"ucode-intel", rpm:"ucode-intel~20190507~lp150.2.18.1", rls:"openSUSELeap15.0"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);