Hello community,

here is the log from the commit of package ucode-intel for openSUSE:Factory 
checked in at 2019-11-18 19:58:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ucode-intel (Old)
 and      /work/SRC/openSUSE:Factory/.ucode-intel.new.26869 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ucode-intel"

Mon Nov 18 19:58:27 2019 rev:47 rq:748239 version:20191112

Changes:
--------
--- /work/SRC/openSUSE:Factory/ucode-intel/ucode-intel.changes  2019-09-26 
20:35:14.103504261 +0200
+++ /work/SRC/openSUSE:Factory/.ucode-intel.new.26869/ucode-intel.changes       
2019-11-18 19:58:31.349950394 +0100
@@ -1,0 +2,40 @@
+Wed Nov  6 06:02:44 UTC 2019 - Marcus Meissner <[email protected]>
+
+- Updated to 20191112 security release (bsc#1155988)
+  - Processor             Identifier     Version       Products
+  - Model        Stepping F-MO-S/PI      Old->New
+  - ---- new platforms ----------------------------------------
+  - AVN          B0/C0    6-4d-8/01           0000012d Atom C2xxx
+  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
+  - SKX-SP       B1       6-55-3/97           01000151 Xeon Scalable
+  - CLX-SP       B0       6-55-6/bf           0400002c Xeon Scalable Gen2
+  - GLK-R        R0       6-7a-8/01           00000016 Pentium J5040/N5030, 
Celeron J4125/J4025/N4020/N4120
+  - ICL-U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
+  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
+  - ---- updated platforms ------------------------------------
+  - SKL-U/Y      D0       6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile
+  - SKX-SP       H0/M0/U0 6-55-4/b7 02000064->02000065 Xeon Scalable
+  - SKX-D        M1       6-55-4/b7 02000064->02000065 Xeon D-21xx
+  - CLX-SP       B1       6-55-7/bf 0500002b->0500002c Xeon Scalable Gen2
+  - SKL-H/S/E3   R0/N0    6-5e-3/36 000000cc->000000d4 Core Gen6
+  - GLK          B0       6-7a-1/01 0000002e->00000032 Pentium J5005/N5000, 
Celeron J4005/J4105/N4000/N4100
+  - AML-Y22      H0       6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile
+  - KBL-U/Y      H0       6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile
+  - CFL-U43e     D0       6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile
+  - WHL-U        W0       6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile
+  - AML-Y        V0       6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
+  - CML-U42      V0       6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
+  - WHL-U        V0       6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile
+  - KBL-G/X      H0       6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8
+  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6
+  - CFL-H/S/E3   U0       6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, 
Mobile, Xeon E
+  - CFL-S        B0       6-9e-b/02 000000b4->000000c6 Core Gen8
+  - CFL-H        R0       6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile
+  - ---- removed platforms ------------------------------------
+  - CFL-H/S      P0       6-9e-c/22 000000a2           Core Gen9
+
+- Includes security fixes for:
+  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
+  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues 
(bsc#1141035)
+
+-------------------------------------------------------------------

Old:
----
  microcode-20190918.tar.gz

New:
----
  microcode-20191112.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ucode-intel.spec ++++++
--- /var/tmp/diff_new_pack.x7sIZX/_old  2019-11-18 19:58:31.977950078 +0100
+++ /var/tmp/diff_new_pack.x7sIZX/_new  2019-11-18 19:58:31.981950076 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           ucode-intel
-Version:        20190918
+Version:        20191112
 Release:        0
 Summary:        Microcode Updates for Intel x86/x86-64 CPUs
 License:        SUSE-Firmware

++++++ microcode-20190918.tar.gz -> microcode-20191112.tar.gz ++++++
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-4d-08
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-4d-08
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-4e-03
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-4e-03
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-03
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-03
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-04
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-04
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-06
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-06
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-55-07
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-55-07
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-5e-03
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-5e-03
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-66-03
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-66-03
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-7a-01
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-7a-01
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-7a-08
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-7a-08
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-7e-05
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-7e-05
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-09
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-09
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-0a
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-0a
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-0b
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-0b
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-8e-0c
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-8e-0c
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-09
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-09
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0a
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0a
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0b
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0b
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0c
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0c
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-9e-0d
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-9e-0d
 differ
Binary files 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/intel-ucode/06-a6-00
 and 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/intel-ucode/06-a6-00
 differ
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/releasenote 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/releasenote
--- 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/releasenote   
    2019-09-18 19:42:01.000000000 +0200
+++ 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/releasenote   
    2019-11-12 19:12:30.000000000 +0100
@@ -82,21 +82,35 @@
 linux-kernel-patches\) are included in the distribution before packaging the
 BDX-ML microcode for late-loading.
 
-== 20190918 Release ==
--- Updates upon 20190618 release --
+== 20191112 Release ==
+-- Updates upon 20190918 release --
 Processor             Identifier     Version       Products
 Model        Stepping F-MO-S/PI      Old->New
 ---- new platforms ----------------------------------------
+AVN          B0/C0    6-4d-8/01           0000012D Atom C2xxx
+CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
+CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
+SKX-SP       B1       6-55-3/97           01000151 Xeon Scalable
+GKL          B0       6-7a-1/01           00000032 Pentium J5005/N5000, 
Celeron J4005/J4105/N4000/N4100
+GKL-R        R0       6-7a-8/01           00000016 Pentium J5040/N5030, 
Celeron J4125/J4025/N4020/N4120
+ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
 
 ---- updated platforms ------------------------------------
-BDW-U/Y      E0/F0    6-3d-4/c0 0000002d->0000002e Core Gen5
-HSX-EX       E0       6-3f-4/80 00000014->00000016 Xeon E7 v3
-BDW-H/E3     E0/G0    6-47-1/22 00000020->00000021 Core Gen5
-BDX-ML       B0/M0/R0 6-4f-1/ef 0b000036->0b000038 Xeon E5/E7 v4; Core 
i7-69xx/68xx
-BDX-DE       V1       6-56-2/10 0000001a->0000001c Xeon D-1520/40
-BDX-DE       V2/3     6-56-3/10 07000017->07000019 Xeon 
D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
-BDX-DE       Y0       6-56-4/10 0f000015->0f000017 Xeon 
D-1557/59/67/71/77/81/87
-BDX-NS       A0       6-56-5/10 0e00000d->0e00000f Xeon D-1513N/23/33/43/53
-SKX-SP       H0/M0/U0 6-55-4/b7 0200005e->00000064 Xeon Scalable
-SKX-D        M1       6-55-4/b7 0200005e->00000064 Xeon D-21xx
-CLX-SP       B1       6-55-7/bf 05000021->0500002b Xeon Scalable Gen2
\ No newline at end of file
+SKL U/Y      D0       6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile
+SKX-SP       H0/M0/U0 6-55-4/b7 02000064->00000065 Xeon Scalable
+SKX-D        M1       6-55-4/b7 02000064->00000065 Xeon D-21xx
+CLX-SP       B0       6-55-6/bf 0400002b->0400002c Xeon Scalable Gen2
+CLX-SP       B1       6-55-7/bf 0500002b->0500002c Xeon Scalable Gen2
+SKL H/S/E3   R0/N0    6-5e-3/36 000000cc->000000d4 Core Gen6
+AML-Y22      H0       6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile
+KBL-U/Y      H0       6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile
+CFL-U43e     D0       6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile
+WHL-U        W0       6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile
+AML-Y        V0       6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
+CML-U42      V0       6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
+WHL-U        V0       6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile
+KBL-G/X      H0       6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8
+KBL-H/S/E3   B0       6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6
+CFL-H/S/E3   U0       6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, Mobile, 
Xeon E
+CFL-S        B0       6-9e-b/02 000000b4->000000c6 Core Gen8
+CFL-H        R0       6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/security.md 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/security.md
--- 
old/Intel-Linux-Processor-Microcode-Data-Files-microcode-20190918/security.md   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/Intel-Linux-Processor-Microcode-Data-Files-microcode-20191112/security.md   
    2019-11-12 19:12:30.000000000 +0100
@@ -0,0 +1,39 @@
+# Security Policy
+
+## Report a Vulnerability
+
+If you have information about a security issue or vulnerability with an 
**Intel branded product or technology**, please send an e-mail to 
[[email protected]](mailto:[email protected]). Encrypt sensitive information 
using our [PGP public 
key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html).
+
+Please provide as much information as possible, including:
+
+- The products and versions affected
+- Detailed description of the vulnerability
+- Information on known exploits
+
+A member of the Intel Product Security Team will review your e-mail and 
contact you to collaborate on resolving the issue. For more information on how 
Intel works to resolve security issues, see:
+
+- [Vulnerability handling 
guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html)
+
+For issues related to Intel's external web presence (Intel.com and related 
subdomains), please contact [Intel's External Security Research 
team](mailto:[email protected]).
+
+## Intel's Bug Bounty Program
+
+Intel Corporation believes that working with skilled security researchers 
across the globe is a crucial part of identifying and mitigating security 
vulnerabilities in Intel products.
+
+Like other major technology companies, Intel incentivizes security researchers 
to report security vulnerabilities in Intel products to us to enable a 
coordinated response. To encourage closer collaboration with the security 
research community on these kinds of issues, Intel created its Bug Bounty 
Program.
+
+If you believe you've found a security vulnerability in an Intel product or 
technology, we encourage you to notify us through our program and work with us 
to mitigate and to coordinate disclosure of the vulnerability.
+
+[Read full 
details.](https://www.intel.com/content/www/us/en/security-center/bug-bounty-program.html)
+
+## Need product support?
+
+The [[email protected]](mailto:[email protected]) e-mail address should only be 
used for reporting security issues.
+
+If you...
+
+- Have questions about the security features of an Intel product
+- Require technical support
+- Want product updates or patches
+
+Please visit [Support & 
Downloads](https://www.intel.com/content/www/us/en/support.html).


Reply via email to