<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regarding MDS (ZombieLoad)  vulnerability in Mobile and Desktop Processors</title>
    <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675798#M39835</link>
    <description>Hello DBoob,
 
Let me check with my upper-level support on your question and we will get back to you.
 
Best regards,

Sergio S.

Intel Customer Support Technician
Under Contract to Intel Corporatio</description>
    <pubDate>Thu, 27 Jun 2019 09:26:11 GMT</pubDate>
    <dc:creator>SergioS_Intel</dc:creator>
    <dc:date>2019-06-27T09:26:11Z</dc:date>
    <item>
      <title>Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675794#M39831</link>
      <description>&lt;P&gt;We’ve recently updated kernel patch and then we ran the vulnerability scan but its showing below message.&lt;/P&gt;&lt;P&gt;We already encaged Redhat but they suggesting us to contact hardware support.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check and suggest us &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Message :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This script (v1.0) is primarily designed to detect&lt;/P&gt;&lt;P&gt;CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, and CVE-2019-11091&lt;/P&gt;&lt;P&gt;on supported Red Hat Enterprise Linux systems and kernel packages.&lt;/P&gt;&lt;P&gt;Result may be inaccurate for other RPM based systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Detected CPU vendor: Intel&lt;/P&gt;&lt;P&gt;CPU: Intel(R) Xeon(R) CPU E5-2660 0 @ 2.20GHz&lt;/P&gt;&lt;P&gt;CPU model: 45 (0x2d)&lt;/P&gt;&lt;P&gt;Running kernel: 3.10.0-957.21.2.el7.x86_64&lt;/P&gt;&lt;P&gt;Architecture: x86_64&lt;/P&gt;&lt;P&gt;Virtualization: vmware&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;* CPU microcode update is not detected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OS details :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@XXXXX tmp]# cat /etc/redhat-release&lt;/P&gt;&lt;P&gt;Red Hat Enterprise Linux Server release 7.4 (Maipo)&lt;/P&gt;&lt;P&gt;[root@XXXXX tmp]# uname -a&lt;/P&gt;&lt;P&gt;Linux XXXX&amp;nbsp;3.10.0-957.21.2.el7.x86_64 #1 SMP Tue May 28 09:26:43 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux&lt;/P&gt;&lt;P&gt;[root@fgtd-learn-rhel74-app001 tmp]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Redhat response :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per your sosreport we see that your processor is listed as:&lt;/P&gt;&lt;P&gt;$ cat /proc/cpuinfo&lt;/P&gt;&lt;P&gt; model name&amp;nbsp;&amp;nbsp;&amp;nbsp;: Intel(R) Xeon(R) CPU E5-2660 0 @ 2.20GHz&lt;/P&gt;&lt;P&gt; stepping&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;: 2&lt;/P&gt;&lt;P&gt;Per Intel's website, more information regarding your processor:&lt;/P&gt;&lt;P&gt; &lt;A href="https://ark.intel.com/content/www/us/en/ark/products/64584/intel-xeon-processor-e5-2660-20m-cache-2-20-ghz-8-00-gt-s-intel-qpi.html" target="_self" alt="https://ark.intel.com/content/www/us/en/ark/products/64584/intel-xeon-processor-e5-2660-20m-cache-2-20-ghz-8-00-gt-s-intel-qpi.html"&gt;&lt;/A&gt;&lt;A href="https://ark.intel.com/content/www/us/en/ark/products/64584/intel-xeon-processor-e5-2660-20m-cache-2-20-ghz-8-00-gt-s-intel-qpi.html"&gt;https://ark.intel.com/content/www/us/en/ark/products/64584/intel-xeon-processor-e5-2660-20m-cache-2-20-ghz-8-00-gt-s-intel-qpi.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is listed as:&lt;/P&gt;&lt;P&gt;Product Collection Intel® Xeon® Processor E5 Family&lt;/P&gt;&lt;P&gt; Code Name Products formerly Sandy Bridge EP&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per the following KCS Article:&lt;/P&gt;&lt;P&gt;Is CPU microcode available to address MDS (ZombieLoad) CVE-2018-12130, CVE-2018-12126, CVE-2018-12127, and CVE-2019-11091 via the microcode_ctl package?&amp;nbsp;&lt;/P&gt;&lt;P&gt; &lt;A href="https://access.redhat.com/articles/4138151" target="_self" alt="https://access.redhat.com/articles/4138151"&gt;&lt;/A&gt;&lt;A href="https://access.redhat.com/articles/4138151"&gt;https://access.redhat.com/articles/4138151&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Red Hat does not provide microcode for this CPU Model + stepping combination. While the article does list multiple E5-2660 models and Sandy Bridge, none of them correlate with the stepping or architecture that matches. You may need to obtain a microcode update from Intel for this processor.&lt;/P&gt;&lt;P&gt;Just a note: I did check your microcode_ctl package to verify it is up to date, unfortunately as previously mentioned, our microcode_ctl package does not cover your CPU.&lt;/P&gt;&lt;P&gt;Generally Red Hat provides microcode on a best effort basis. While the following CVE does not pertain to this case, the information regarding Red Hat's microcode still applies:&lt;/P&gt;&lt;P&gt;Is CPU microcode available to address CVE-2017-5715 via the microcode_ctl package?&lt;/P&gt;&lt;P&gt; &lt;A href="https://access.redhat.com/articles/3436091" target="_self" alt="https://access.redhat.com/articles/3436091"&gt;&lt;/A&gt;&lt;A href="https://access.redhat.com/articles/3436091"&gt;https://access.redhat.com/articles/3436091&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The relevant information in the article is as follows:&lt;/P&gt;&lt;P&gt;"Historically, Red Hat has provided updated microcode, developed by our microprocessor partners, as a customer convenience. Red Hat temporarily suspended this practice in January 2018 while microcode stabilized.&lt;/P&gt;&lt;P&gt;Red Hat is once again providing an updated Intel microcode package, microcode_ctl, and AMD microcode package, linux-firmware, to customers in order to simplify deployment processes and minimize downtime.&lt;/P&gt;&lt;P&gt;Red Hat will continue to update these microcode packages as necessary. Please contact your hardware vendor to determine whether more recent BIOS/firmware updates are recommended, as additional improvements may be available."&lt;/P&gt;&lt;P&gt;As microcode is provided as a convenience, unfortunately there are no ETAs on if/when we will receive microcode for your specific processor. This is yet another reason why we suggest checking with your vendor for updated microcode. Although we may package microcode, it can also be outdated by what the vendor may have available.&lt;/P&gt;&lt;P&gt;Please let me know if you have any additional questions or concerns regarding anything stated here.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 08:12:24 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675794#M39831</guid>
      <dc:creator>DBoob</dc:creator>
      <dc:date>2019-06-14T08:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675795#M39832</link>
      <description>Hello DBoob,

Thank you for contacting Intel Customer Support.  

When it comes up to microcode updates, there are two ways of getting them:

One: OS vendor (RedHat in this case obtains the microcode from Intel directly and push them via OS updates)

Two: BIOS update (board vendor)

The latest microcode updates for a manual push on a Linux OS can be obtained from github:

&lt;A href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files"&gt;https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files&lt;/A&gt;

There is also a document with the microcode update guide here:

&lt;A href="https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf"&gt;https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf&lt;/A&gt;

This shows the planned microcode updates for the different processors Intel manufactures.

So from our side that it what we can share with the customer. Other than that he needs to reach out to OS vendor. Redhat in this case.

Please do not hesitate to contact us again if you need further assistance.

Best regards,

Sergio S.

Intel Customer Support Technician
Under Contract to Intel Corporation</description>
      <pubDate>Sat, 22 Jun 2019 08:27:35 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675795#M39832</guid>
      <dc:creator>SergioS_Intel</dc:creator>
      <dc:date>2019-06-22T08:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675796#M39833</link>
      <description>&lt;P&gt;Hello DBoob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am following your question and would like to know if you need more assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sergio S.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Intel Customer Support Technician&lt;/P&gt;&lt;P&gt;Under Contract to Intel Corporation&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2019 06:53:04 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675796#M39833</guid>
      <dc:creator>SergioS_Intel</dc:creator>
      <dc:date>2019-06-26T06:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675797#M39834</link>
      <description>Hi Sergio,

Thank You for your email !!!

Per your recommendation, We’ve updated OS patch and then we ran the vulnerability scan and resulted was vulnerable for Intel(R) Xeon(R) CPU E5-2660 0 @ 2.20GHz.
Then we encaged Redhat and They suggesting us contact vendor if they have any latest microcode patch available for Intel(R) Xeon(R) CPU E5-2660 0 @ 2.20GHz.


We just wanted to know, The CVE(CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, and CVE-2019-11091) was included fix the MDS (ZombieLoad) vulnerability(Intel-SA-00233) for Intel® Xeon® Processor E5 V0 Family.


Best Regards,

Dhanasekar Boobalan ll Specialist ll Blackboard – Compute/Linux

CSS Corp ll 7th Floor, Block A6, Shriram Gateway (SEZ) ||16, GST Road || New Perungalathur || Chennai

|| India || Cell : +91 9786060209 ll &lt;A href="http://www.csscorp.com"&gt;www.csscorp.com&lt;/A&gt;&amp;lt;&lt;A href="http://www.csscorp.com/"&gt;http://www.csscorp.com/&lt;/A&gt;&amp;gt;</description>
      <pubDate>Wed, 26 Jun 2019 15:24:42 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675797#M39834</guid>
      <dc:creator>DBoob</dc:creator>
      <dc:date>2019-06-26T15:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675798#M39835</link>
      <description>Hello DBoob,
 
Let me check with my upper-level support on your question and we will get back to you.
 
Best regards,

Sergio S.

Intel Customer Support Technician
Under Contract to Intel Corporatio</description>
      <pubDate>Thu, 27 Jun 2019 09:26:11 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675798#M39835</guid>
      <dc:creator>SergioS_Intel</dc:creator>
      <dc:date>2019-06-27T09:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675799#M39836</link>
      <description>Hello DBoob,
 
In regards to SA-00233 there is a guide for the Microcode Update posted here:

&lt;A href="https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf"&gt;https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf&lt;/A&gt;
 
The update shows Sandy Bridge Server EN/EP/EP4S as Production Status: Planned and it is on a TBA (To Be Announced) state.

Last day revised on the SA was on 06/17/2019.

Our recommendation would be keeping an eye on the SA website:

&lt;A href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html"&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html&lt;/A&gt;

Or contacting us in the future for updates.

Best regards,
Sergio S.

 Intel Customer Support Technician
Under Contract to Intel Corporation</description>
      <pubDate>Tue, 02 Jul 2019 09:19:23 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675799#M39836</guid>
      <dc:creator>SergioS_Intel</dc:creator>
      <dc:date>2019-07-02T09:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding MDS (ZombieLoad)  vulnerability</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675800#M39837</link>
      <description>&lt;P&gt;Hello DBoob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case you need more assistance feel free to contact us back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Sergio S.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Intel Customer Support Technician&lt;/P&gt;&lt;P&gt;Under Contract to Intel Corporation&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 09:10:33 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Regarding-MDS-ZombieLoad-vulnerability/m-p/675800#M39837</guid>
      <dc:creator>SergioS_Intel</dc:creator>
      <dc:date>2019-07-09T09:10:33Z</dc:date>
    </item>
  </channel>
</rss>

