{"affected":[{"ecosystem_specific":{"binaries":[{"ucode-intel":"20240813-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20240813-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ucode-intel fixes the following issues:\n\n- Intel CPU Microcode was updated to the 20240514 release (bsc#1224277)\n  - CVE-2023-45733: Security updates for  INTEL-SA-01051\n  - CVE-2023-46103: Security updates for  INTEL-SA-01052\n  - CVE-2023-45745,CVE-2023-47855: Security updates for INTEL-SA-01036\n\n- Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)\n  - Security updates for INTEL-SA-INTEL-SA-00972\n    - CVE-2023-39368: Protection mechanism failure of bus lock regulator\n      for some Intel Processors may allow an unauthenticated user to\n      potentially enable denial of service via network access\n  - Security updates for INTEL-SA-INTEL-SA-00982\n    - CVE-2023-38575: Non-transparent sharing of return predictor targets\n      between contexts in some Intel Processors may allow an authorized\n      user to potentially enable information disclosure via local access.\n  - Security updates for INTEL-SA-INTEL-SA-00898\n    - CVE-2023-28746: Information exposure through microarchitectural\n      state after transient execution from some register files for some\n      Intel Atom Processors may allow an authenticated user to potentially\n      enable information disclosure via local access.\n  - Security updates for INTEL-SA-INTEL-SA-00960\n    - CVE-2023-22655 Protection mechanism failure in some 3rd and 4th\n      Generation Intel Xeon Processors when using Intel SGX or Intel TDX\n      may allow a privileged user to potentially enable escalation of\n      privilege via local access.\n  - Security updates for INTEL-SA-INTEL-SA-01045\n    - CVE-2023-43490: Incorrect calculation in microcode keying mechanism\n      for some Intel Xeon D Processors with Intel SGX may allow a\n      privileged user to potentially enable information disclosure via\n      local access.\n","id":"SUSE-SU-2025:20020-1","modified":"2025-02-03T08:49:06Z","published":"2025-02-03T08:49:06Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520020-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-22655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-28746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-43490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-46103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-47855"}],"related":["CVE-2023-22655","CVE-2023-28746","CVE-2023-38575","CVE-2023-39368","CVE-2023-43490","CVE-2023-45733","CVE-2023-45745","CVE-2023-46103","CVE-2023-47855"],"summary":"Security update for ucode-intel","upstream":["CVE-2023-22655","CVE-2023-28746","CVE-2023-38575","CVE-2023-39368","CVE-2023-43490","CVE-2023-45733","CVE-2023-45745","CVE-2023-46103","CVE-2023-47855"]}