{"affected":[{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:HPE Helion OpenStack 8","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=HPE%20Helion%20OpenStack%208"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 8","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%208"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 8","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3-LTSS","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3-BCL","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20220207-13.93.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20220207-13.93.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20220207 release.\n\n- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)\n- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)\n- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)\n- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)\n\n- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)\n- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)\n","id":"SUSE-SU-2022:0575-1","modified":"2022-02-25T16:00:30Z","published":"2022-02-25T16:00:30Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220575-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-0127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-0145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-0146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-33120"}],"related":["CVE-2021-0127","CVE-2021-0145","CVE-2021-0146","CVE-2021-33120"],"summary":"Security update for ucode-intel","upstream":["CVE-2021-0127","CVE-2021-0145","CVE-2021-0146","CVE-2021-33120"]}