Hello community, here is the log from the commit of package ucode-intel for openSUSE:Factory checked in at 2019-11-18 19:58:27 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ucode-intel (Old) and /work/SRC/openSUSE:Factory/.ucode-intel.new.26869 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ucode-intel" Mon Nov 18 19:58:27 2019 rev:47 rq:748239 version:20191112 Changes: -------- --- /work/SRC/openSUSE:Factory/ucode-intel/ucode-intel.changes 2019-09-26 20:35:14.103504261 +0200 +++ /work/SRC/openSUSE:Factory/.ucode-intel.new.26869/ucode-intel.changes 2019-11-18 19:58:31.349950394 +0100 @@ -1,0 +2,40 @@ +Wed Nov 6 06:02:44 UTC 2019 - Marcus Meissner <[email protected]> + +- Updated to 20191112 security release (bsc#1155988) + - Processor Identifier Version Products + - Model Stepping F-MO-S/PI Old->New + - ---- new platforms ---------------------------------------- + - AVN B0/C0 6-4d-8/01 0000012d Atom C2xxx + - CNL-U D0 6-66-3/80 0000002a Core Gen8 Mobile + - SKX-SP B1 6-55-3/97 01000151 Xeon Scalable + - CLX-SP B0 6-55-6/bf 0400002c Xeon Scalable Gen2 + - GLK-R R0 6-7a-8/01 00000016 Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 + - ICL-U/Y D1 6-7e-5/80 00000046 Core Gen10 Mobile + - CML-U62 A0 6-a6-0/80 000000c6 Core Gen10 Mobile + - ---- updated platforms ------------------------------------ + - SKL-U/Y D0 6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile + - SKX-SP H0/M0/U0 6-55-4/b7 02000064->02000065 Xeon Scalable + - SKX-D M1 6-55-4/b7 02000064->02000065 Xeon D-21xx + - CLX-SP B1 6-55-7/bf 0500002b->0500002c Xeon Scalable Gen2 + - SKL-H/S/E3 R0/N0 6-5e-3/36 000000cc->000000d4 Core Gen6 + - GLK B0 6-7a-1/01 0000002e->00000032 Pentium J5005/N5000, Celeron J4005/J4105/N4000/N4100 + - AML-Y22 H0 6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile + - KBL-U/Y H0 6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile + - CFL-U43e D0 6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile + - WHL-U W0 6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile + - AML-Y V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile + - CML-U42 V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile + - WHL-U V0 6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile + - KBL-G/X H0 6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8 + - KBL-H/S/E3 B0 6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6 + - CFL-H/S/E3 U0 6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, Mobile, Xeon E + - CFL-S B0 6-9e-b/02 000000b4->000000c6 Core Gen8 + - CFL-H R0 6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile + - ---- removed platforms ------------------------------------ + - CFL-H/S P0 6-9e-c/22 000000a2 Core Gen9 + +- Includes security fixes for: + - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073) + - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035) + +------------------------------------------------------------------- Old: ---- microcode-20190918.tar.gz New: ---- microcode-20191112.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ucode-intel.spec ++++++ --- /var/tmp/diff_new_pack.x7sIZX/_old 2019-11-18 19:58:31.977950078 +0100 +++ /var/tmp/diff_new_pack.x7sIZX/_new 2019-11-18 19:58:31.981950076 +0100 @@ -17,7 +17,7 @@ Name: ucode-intel -Version: 20190918 +Version: 20191112 Release: 0 Summary: Microcode Updates for Intel x86/x86-64 CPUs License: SUSE-Firmware ++++++ microcode-20190918.tar.gz -> microcode-20191112.tar.gz ++++++ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-4d-08 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-4d-08 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-4e-03 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-4e-03 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-03 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-03 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-04 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-04 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-06 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-06 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-07 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-07 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-5e-03 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-5e-03 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-66-03 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-66-03 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-7a-01 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-7a-01 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-7a-08 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-7a-08 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-7e-05 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-7e-05 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-09 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-09 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-0a and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-0a differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-0b and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-0b differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-0c and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-0c differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-09 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-09 differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0a and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0a differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0b and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0b differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0c and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0c differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0d and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0d differ Binary files old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-a6-00 and new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-a6-00 differ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/releasenote new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/releasenote --- old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/releasenote 2019-09-18 19:42:01.000000000 +0200 +++ new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/releasenote 2019-11-12 19:12:30.000000000 +0100 @@ -82,21 +82,35 @@ linux-kernel-patches\) are included in the distribution before packaging the BDX-ML microcode for late-loading. -== 20190918 Release == --- Updates upon 20190618 release -- +== 20191112 Release == +-- Updates upon 20190918 release -- Processor Identifier Version Products Model Stepping F-MO-S/PI Old->New ---- new platforms ---------------------------------------- +AVN B0/C0 6-4d-8/01 0000012D Atom C2xxx +CML-U62 A0 6-a6-0/80 000000c6 Core Gen10 Mobile +CNL-U D0 6-66-3/80 0000002a Core Gen8 Mobile +SKX-SP B1 6-55-3/97 01000151 Xeon Scalable +GKL B0 6-7a-1/01 00000032 Pentium J5005/N5000, Celeron J4005/J4105/N4000/N4100 +GKL-R R0 6-7a-8/01 00000016 Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 +ICL U/Y D1 6-7e-5/80 00000046 Core Gen10 Mobile ---- updated platforms ------------------------------------ -BDW-U/Y E0/F0 6-3d-4/c0 0000002d->0000002e Core Gen5 -HSX-EX E0 6-3f-4/80 00000014->00000016 Xeon E7 v3 -BDW-H/E3 E0/G0 6-47-1/22 00000020->00000021 Core Gen5 -BDX-ML B0/M0/R0 6-4f-1/ef 0b000036->0b000038 Xeon E5/E7 v4; Core i7-69xx/68xx -BDX-DE V1 6-56-2/10 0000001a->0000001c Xeon D-1520/40 -BDX-DE V2/3 6-56-3/10 07000017->07000019 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19 -BDX-DE Y0 6-56-4/10 0f000015->0f000017 Xeon D-1557/59/67/71/77/81/87 -BDX-NS A0 6-56-5/10 0e00000d->0e00000f Xeon D-1513N/23/33/43/53 -SKX-SP H0/M0/U0 6-55-4/b7 0200005e->00000064 Xeon Scalable -SKX-D M1 6-55-4/b7 0200005e->00000064 Xeon D-21xx -CLX-SP B1 6-55-7/bf 05000021->0500002b Xeon Scalable Gen2 \ No newline at end of file +SKL U/Y D0 6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile +SKX-SP H0/M0/U0 6-55-4/b7 02000064->00000065 Xeon Scalable +SKX-D M1 6-55-4/b7 02000064->00000065 Xeon D-21xx +CLX-SP B0 6-55-6/bf 0400002b->0400002c Xeon Scalable Gen2 +CLX-SP B1 6-55-7/bf 0500002b->0500002c Xeon Scalable Gen2 +SKL H/S/E3 R0/N0 6-5e-3/36 000000cc->000000d4 Core Gen6 +AML-Y22 H0 6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile +KBL-U/Y H0 6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile +CFL-U43e D0 6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile +WHL-U W0 6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile +AML-Y V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile +CML-U42 V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile +WHL-U V0 6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile +KBL-G/X H0 6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8 +KBL-H/S/E3 B0 6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6 +CFL-H/S/E3 U0 6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, Mobile, Xeon E +CFL-S B0 6-9e-b/02 000000b4->000000c6 Core Gen8 +CFL-H R0 6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/security.md new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/security.md --- old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/security.md 1970-01-01 01:00:00.000000000 +0100 +++ new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/security.md 2019-11-12 19:12:30.000000000 +0100 @@ -0,0 +1,39 @@ +# Security Policy + +## Report a Vulnerability + +If you have information about a security issue or vulnerability with an **Intel branded product or technology**, please send an e-mail to [[email protected]](mailto:[email protected]). Encrypt sensitive information using our [PGP public key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html). + +Please provide as much information as possible, including: + +- The products and versions affected +- Detailed description of the vulnerability +- Information on known exploits + +A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see: + +- [Vulnerability handling guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html) + +For issues related to Intel's external web presence (Intel.com and related subdomains), please contact [Intel's External Security Research team](mailto:[email protected]). + +## Intel's Bug Bounty Program + +Intel Corporation believes that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities in Intel products. + +Like other major technology companies, Intel incentivizes security researchers to report security vulnerabilities in Intel products to us to enable a coordinated response. To encourage closer collaboration with the security research community on these kinds of issues, Intel created its Bug Bounty Program. + +If you believe you've found a security vulnerability in an Intel product or technology, we encourage you to notify us through our program and work with us to mitigate and to coordinate disclosure of the vulnerability. + +[Read full details.](https://www.intel.com/content/www/us/en/security-center/bug-bounty-program.html) + +## Need product support? + +The [[email protected]](mailto:[email protected]) e-mail address should only be used for reporting security issues. + +If you... + +- Have questions about the security features of an Intel product +- Require technical support +- Want product updates or patches + +Please visit [Support & Downloads](https://www.intel.com/content/www/us/en/support.html).
