Bug 1214099 - VUL-0: ucode-intel: 20230808 release
Summary: VUL-0: ucode-intel: 20230808 release
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/374749/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-41804:7.2:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-09 07:35 UTC by Alexander Bergmann
Modified: 2023-10-20 08:42 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-08-09 07:35:02 UTC
# Release Notes
## [microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808)

### Purpose

- Security updates for [INTEL-SA-00828](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html)
- Security updates for [INTEL-SA-00836](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html)
- Security updates for [INTEL-SA-00837](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html)

- Update for functional issues. Refer to [13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
- Update for functional issues. Refer to [10th Gen Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
- Update for functional issues. Refer to [8th Generation Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
- Update for functional issues. Refer to [7th and 8th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
- Update for functional issues. Refer to [2nd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
- Update for functional issues. Refer to [Intel® Xeon® D-2100 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338854) for details.

### New Platforms

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| ADL-N          | A0       | 06-be-00/11 |          | 00000011 | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 |          | 00004119 | Core Gen13

### Updated Platforms

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CML-U62 V2     | K1       | 06-a6-01/80 | 000000f6 | 000000f8 | Core Gen10 Mobile
| SKX-D          | H0       | 06-55-04/b7 | 02006f05 | 02007006 | Xeon D-21xx
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006e05 | 02007006 | Xeon Scalable
| KBL-G/H/S/X/E3 | B0       | 06-9e-09/2a | 000000f2 | 000000f4 | Core Gen7; Xeon E3 v6
| ADL            | L0       | 06-9a-03/80 | 0000042a | 0000042c | Core Gen12
| ADL            | L0       | 06-9a-04/80 | 0000042a | 0000042c | Core Gen12
| ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d000390 | 0d0003a5 | Xeon Scalable Gen3
| CML-S102       | Q0       | 06-a5-05/22 | 000000f6 | 000000f8 | Core Gen10
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000f2 | 000000f4 | Core Gen8 Mobile
| KBL-R U        | Y0       | 06-8e-0a/c0 | 000000f2 | 000000f4 | Core Gen8 Mobile
| CFL-H          | R0       | 06-9e-0d/22 | 000000f8 | 000000fa | Core Gen9 Mobile
| RKL-S          | B0       | 06-a7-01/02 | 00000058 | 00000059 | Core Gen11
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000ba | 000000bc | Core Gen10 Mobile
| TGL-H          | R0       | 06-8d-01/c2 | 00000044 | 00000046 | Core Gen11 Mobile
| SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000461 | 2b0004b1 | Xeon Scalable Gen4
| SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000461 | 2b0004b1 | Xeon Scalable Gen4
| SPR-SP         | E3       | 06-8f-06/87 | 2b000461 | 2b0004b1 | Xeon Scalable Gen4
| SPR-SP         | E2       | 06-8f-05/87 | 2b000461 | 2b0004b1 | Xeon Scalable Gen4
| SPR-SP         | E0       | 06-8f-04/87 | 2b000461 | 2b0004b1 | Xeon Scalable Gen4
| CML-S62        | G1       | 06-a5-03/22 | 000000f6 | 000000f8 | Core Gen10
| AML-Y22        | H0       | 06-8e-09/10 | 000000f0 | 000000f4 | Core Gen8 Mobile
| RPL-S          | B0       | 06-b7-01/32 | 00000113 | 00000119 | Core Gen13
| CML-U62 V1     | A0       | 06-a6-00/80 | 000000f6 | 000000f8 | Core Gen10 Mobile
| ADL-N          | A0       | 06-be-00/11 |          | 00000011 | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
| CPX-SP         | A1       | 06-55-0b/bf | 07002601 | 07002703 | Xeon Scalable Gen3
| CLX-SP         | B0       | 06-55-06/bf | 04003501 | 04003604 | Xeon Scalable Gen2
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f2 | 000000f4 | Core Gen8 Desktop, Mobile, Xeon E
| SPR-HBM        | Bx       | 06-8f-08/10 | 2c0001d1 | 2c000271 | Xeon Max
| WHL-U          | W0       | 06-8e-0b/d0 | 000000f2 | 000000f4 | Core Gen8 Mobile
| CLX-SP         | B1       | 06-55-07/bf | 05003501 | 05003604 | Xeon Scalable Gen2
| CFL-S          | B0       | 06-9e-0b/02 | 000000f2 | 000000f4 | Core Gen8
| TGL-R          | C0       | 06-8c-02/c2 | 0000002a | 0000002c | Core Gen11 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000f2 | 000000f4 | Core Gen7 Mobile
| KBL-U23e       | J1       | 06-8e-09/c0 | 000000f2 | 000000f4 | Core Gen7 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000f6 | 000000f8 | Core Gen10 Mobile
| CML-U42        | V0       | 06-8e-0c/94 | 000000f6 | 000000f8 | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000f6 | 000000f8 | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000f6 | 000000f8 | Core Gen8 Mobile
| SKX-SP         | B1       | 06-55-03/97 | 01000171 | 01000181 | Xeon Scalable
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000f2 | 000000f4 | Core Gen9
| CFL-S          | P0       | 06-9e-0c/22 | 000000f2 | 000000f4 | Core Gen9 Desktop
| TGL            | B0/B1    | 06-8c-01/80 | 000000aa | 000000ac | Core Gen11 Mobile
| ADL            | C0       | 06-97-02/07 | 0000002c | 0000002e | Core Gen12
| ADL            | C0       | 06-97-05/07 | 0000002c | 0000002e | Core Gen12
| ADL            | C0       | 06-bf-02/07 | 0000002c | 0000002e | Core Gen12
| ADL            | C0       | 06-bf-05/07 | 0000002c | 0000002e | Core Gen12
| CML-H          | R1       | 06-a5-02/20 | 000000f6 | 000000f8 | Core Gen10 Mobile
| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 |          | 00004119 | Core Gen13
| RPL-U 2+8      | Q0       | 06-ba-03/e0 |          | 00004119 | Core Gen13
Comment 2 OBSbugzilla Bot 2023-08-09 09:05:04 UTC
This is an autogenerated message for OBS integration:
This bug (1214099) was mentioned in
https://build.opensuse.org/request/show/1103094 Factory / ucode-intel
Comment 4 Carlos López 2023-08-10 07:43:31 UTC
(In reply to Alexander Bergmann from comment #0)
> - Security updates for
> [INTEL-SA-00828](https://www.intel.com/content/www/us/en/security-center/
> advisory/intel-sa-00828.html)

CVE-2022-40982

> - Security updates for
> [INTEL-SA-00836](https://www.intel.com/content/www/us/en/security-center/
> advisory/intel-sa-00836.html)

CVE-2023-23908

> - Security updates for
> [INTEL-SA-00837](https://www.intel.com/content/www/us/en/security-center/
> advisory/intel-sa-00837.html)

CVE-2022-41804
Comment 6 Maintenance Automation 2023-08-11 12:30:17 UTC
SUSE-SU-2023:3289-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1206418, 1214099
CVE References: CVE-2022-40982, CVE-2022-41804, CVE-2023-23908
Sources used:
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): ucode-intel-20230808-13.110.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-08-18 16:30:14 UTC
SUSE-SU-2023:3359-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1206418, 1214099
CVE References: CVE-2022-40982, CVE-2022-41804, CVE-2023-23908
Sources used:
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): ucode-intel-20230808-150100.3.223.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): ucode-intel-20230808-150100.3.223.1
SUSE CaaS Platform 4.0 (src): ucode-intel-20230808-150100.3.223.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): ucode-intel-20230808-150100.3.223.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-08-23 08:30:01 UTC
SUSE-SU-2023:3383-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1206418, 1214099
CVE References: CVE-2022-40982, CVE-2022-41804, CVE-2023-23908
Sources used:
openSUSE Leap Micro 5.3 (src): ucode-intel-20230808-150200.27.1
openSUSE Leap Micro 5.4 (src): ucode-intel-20230808-150200.27.1
openSUSE Leap 15.4 (src): ucode-intel-20230808-150200.27.1
openSUSE Leap 15.5 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro 5.3 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro 5.4 (src): ucode-intel-20230808-150200.27.1
Basesystem Module 15-SP4 (src): ucode-intel-20230808-150200.27.1
Basesystem Module 15-SP5 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): ucode-intel-20230808-150200.27.1
SUSE Manager Proxy 4.2 (src): ucode-intel-20230808-150200.27.1
SUSE Manager Retail Branch Server 4.2 (src): ucode-intel-20230808-150200.27.1
SUSE Manager Server 4.2 (src): ucode-intel-20230808-150200.27.1
SUSE Enterprise Storage 7.1 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro 5.1 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro 5.2 (src): ucode-intel-20230808-150200.27.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): ucode-intel-20230808-150200.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-08-23 08:30:04 UTC
SUSE-SU-2023:3382-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1206418, 1214099
CVE References: CVE-2022-40982, CVE-2022-41804, CVE-2023-23908
Sources used:
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): ucode-intel-20230808-123.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): ucode-intel-20230808-123.1
SUSE Linux Enterprise Server 12 SP5 (src): ucode-intel-20230808-123.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Marcus Meissner 2023-10-20 08:42:26 UTC
released