{"affected":[{"ecosystem_specific":{"binaries":[{"ucode-intel":"20230214-3.49.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20230214-3.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20230214-3.49.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20230214-3.49.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ucode-intel fixes the following issues:\n\nUpdated to Intel CPU Microcode 20230214 release.\n  \nSecurity issues fixed:\n\n- CVE-2022-38090: Security updates for [INTEL-SA-00767](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html) (bsc#1208275)\n- CVE-2022-33196: Security updates for [INTEL-SA-00738](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html) (bsc#1208276)\n- CVE-2022-21216: Security updates for [INTEL-SA-00700](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html) (bsc#1208277)\n\n- New Platforms:\n  \n  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products\n  |:---------------|:---------|:------------|:---------|:---------|:---------\n  | SPR-SP         | E2       | 06-8f-05/87 |          | 2b000181 | Xeon Scalable Gen4\n  | SPR-SP         | E3       | 06-8f-06/87 |          | 2b000181 | Xeon Scalable Gen4\n  | SPR-SP         | E4       | 06-8f-07/87 |          | 2b000181 | Xeon Scalable Gen4\n  | SPR-SP         | E5       | 06-8f-08/87 |          | 2b000181 | Xeon Scalable Gen4\n  | SPR-HBM        | B3       | 06-8f-08/10 |          | 2c000170 | Xeon Max\n  | RPL-P 6+8      | J0       | 06-ba-02/07 |          | 0000410e | Core Gen13\n  | RPL-H 6+8      | J0       | 06-ba-02/07 |          | 0000410e | Core Gen13\n  | RPL-U 2+8      | Q0       | 06-ba-02/07 |          | 0000410e | Core Gen13\n\n- Updated Platforms:\n  \n  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products\n  |:---------------|:---------|:------------|:---------|:---------|:---------\n  | ADL            | C0       | 06-97-02/07 | 00000026 | 0000002c | Core Gen12\n  | ADL            | C0       | 06-97-05/07 | 00000026 | 0000002c | Core Gen12\n  | ADL            | C0       | 06-bf-02/07 | 00000026 | 0000002c | Core Gen12\n  | ADL            | C0       | 06-bf-05/07 | 00000026 | 0000002c | Core Gen12\n  | ADL            | L0       | 06-9a-03/80 | 00000424 | 00000429 | Core Gen12\n  | ADL            | L0       | 06-9a-04/80 | 00000424 | 00000429 | Core Gen12\n  | CLX-SP         | B0       | 06-55-06/bf | 04003302 | 04003303 | Xeon Scalable Gen2\n  | CLX-SP         | B1       | 06-55-07/bf | 05003302 | 05003303 | Xeon Scalable Gen2\n  | CPX-SP         | A1       | 06-55-0b/bf | 07002501 | 07002503 | Xeon Scalable Gen3\n  | GLK            | B0       | 06-7a-01/01 | 0000003c | 0000003e | Pentium Silver N/J5xxx, Celeron N/J4xxx\n  | GLK-R          | R0       | 06-7a-08/01 | 00000020 | 00000022 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120\n  | ICL-D          | B0       | 06-6c-01/10 | 01000201 | 01000211 | Xeon D-17xx, D-27xx\n  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b6 | 000000b8 | Core Gen10 Mobile\n  | ICX-SP         | D0       | 06-6a-06/87 | 0d000375 | 0d000389 | Xeon Scalable Gen3\n  | JSL            | A0/A1    | 06-9c-00/01 | 24000023 | 24000024 | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105\n  | LKF            | B2/B3    | 06-8a-01/10 | 00000031 | 00000032 | Core w/Hybrid Technology\n  | RKL-S          | B0       | 06-a7-01/02 | 00000056 | 00000057 | Core Gen11\n  | RPL-S          | S0       | 06-b7-01/32 | 0000010e | 00000112 | Core Gen13\n  | SKX-SP         | B1       | 06-55-03/97 | 0100015e | 01000161 | Xeon Scalable\n","id":"SUSE-SU-2023:0456-1","modified":"2023-02-20T11:21:57Z","published":"2023-02-20T11:21:57Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230456-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21216"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-38090"}],"related":["CVE-2022-21216","CVE-2022-33196","CVE-2022-38090"],"summary":"Security update for ucode-intel","upstream":["CVE-2022-21216","CVE-2022-33196","CVE-2022-38090"]}