Lucene search

K
openvasCopyright (C) 2019 Greenbone Networks GmbHOPENVAS:1361412562310852507
HistoryMay 21, 2019 - 12:00 a.m.

openSUSE: Security Advisory for ucode-intel (openSUSE-SU-2019:1408-1)

2019-05-2100:00:00
Copyright (C) 2019 Greenbone Networks GmbH
plugins.openvas.org
91

0.001 Low

EPSS

Percentile

24.0%

The remote host is missing an update for the

# Copyright (C) 2019 Greenbone Networks GmbH
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (C) the respective author(s)
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.852507");
  script_version("2020-01-31T08:04:39+0000");
  script_cve_id("CVE-2018-12126", "CVE-2018-12127", "CVE-2018-12130", "CVE-2019-11091");
  script_tag(name:"cvss_base", value:"4.7");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:N/A:N");
  script_tag(name:"last_modification", value:"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)");
  script_tag(name:"creation_date", value:"2019-05-21 02:01:10 +0000 (Tue, 21 May 2019)");
  script_name("openSUSE: Security Advisory for ucode-intel (openSUSE-SU-2019:1408-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2019 Greenbone Networks GmbH");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=openSUSELeap42\.3");

  script_xref(name:"openSUSE-SU", value:"2019:1408-1");
  script_xref(name:"URL", value:"https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'ucode-intel'
  package(s) announced via the openSUSE-SU-2019:1408-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for ucode-intel fixes the following issues:

  This update contains the Intel QSR 2019.1 Microcode release (boo#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

  Release notes:

  - Processor             Identifier     Version       Products

  - Model        Stepping F-MO-S/PI      Old->New

  - ---- new platforms ----------------------------------------

  - CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2

  - ---- updated platforms ------------------------------------

  - SNB          D2/G1/Q0 6-2a-7/12 0000002e->0000002f Core Gen2

  - IVB          E1/L1    6-3a-9/12 00000020->00000021 Core Gen3

  - HSW          C0       6-3c-3/32 00000025->00000027 Core Gen4

  - BDW-U/Y      E0/F0    6-3d-4/c0 0000002b->0000002d Core Gen5

  - IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e->0000042f Core Gen3 X Series,
  Xeon E5 v2

  - IVB-EX       D1       6-3e-7/ed 00000714->00000715 Xeon E7 v2

  - HSX-E/EP     Cx/M1    6-3f-2/6f 00000041->00000043 Core Gen4 X series,
  Xeon E5 v3

  - HSX-EX       E0       6-3f-4/80 00000013->00000014 Xeon E7 v3

  - HSW-U        C0/D0    6-45-1/72 00000024->00000025 Core Gen4

  - HSW-H        C0       6-46-1/32 0000001a->0000001b Core Gen4

  - BDW-H/E3     E0/G0    6-47-1/22 0000001e->00000020 Core Gen5

  - SKL-U/Y      D0/K1    6-4e-3/c0 000000c6->000000cc Core Gen6

  - SKX-SP       H0/M0/U0 6-55-4/b7 0200005a->0000005e Xeon Scalable

  - SKX-D        M1       6-55-4/b7 0200005a->0000005e Xeon D-21xx

  - BDX-DE       V1       6-56-2/10 00000019->0000001a Xeon D-1520/40

  - BDX-DE       V2/3     6-56-3/10 07000016->07000017 Xeon
  D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19

  - BDX-DE       Y0       6-56-4/10 0f000014->0f000015 Xeon
  D-1557/59/67/71/77/81/87

  - BDX-NS       A0       6-56-5/10 0e00000c->0e00000d Xeon
  D-1513N/23/33/43/53

  - APL          D0       6-5c-9/03 00000036->00000038 Pentium N/J4xxx,
  Celeron N/J3xxx, Atom x5/7-E39xx

  - SKL-H/S      R0/N0    6-5e-3/36 000000c6->000000cc Core Gen6, Xeon E3 v5

  - DNV          B0       6-5f-1/01 00000024->0000002e Atom Processor C
  Series

  - GLK          B0       6-7a-1/01 0000002c->0000002e Pentium Silver
  N/J5xxx, Celeron N/J4xxx

  - AML-Y22      H0       6-8e-9/10 0000009e->000000b4 Core Gen8 Mobile

  - KBL-U/Y      H0       6-8e-9/c0 0000009a->000000b4 Core Gen7 Mobile

  - CFL-U43e     D0       6-8e-a/c0 0000009e->000000b4 Core Gen8 Mobile

  - WHL-U        W0       6-8e-b/d0 000000a4->000000b8 Core Gen8 Mobile

  - WHL-U        V0       6-8e-d/94 000000b2->000000b8 Core Gen8 Mobile

  - KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a->00000 ...

  Description truncated. Please see the references for more information.");

  script_tag(name:"affected", value:"'ucode-intel' package(s) on openSUSE Leap 42.3.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "openSUSELeap42.3") {

  if(!isnull(res = isrpmvuln(pkg:"ucode-intel", rpm:"ucode-intel~20190514~32.1", rls:"openSUSELeap42.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"ucode-intel-blob", rpm:"ucode-intel-blob~20190514~32.1", rls:"openSUSELeap42.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"ucode-intel-debuginfo", rpm:"ucode-intel-debuginfo~20190514~32.1", rls:"openSUSELeap42.3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"ucode-intel-debugsource", rpm:"ucode-intel-debugsource~20190514~32.1", rls:"openSUSELeap42.3"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);