{"affected":[{"ecosystem_specific":{"binaries":[{"ucode-intel":"20240312-134.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20240312-134.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20240312-134.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20240312-134.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ucode-intel fixes the following issues:\n\n- Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)\n- CVE-2023-39368: Protection mechanism failure of bus lock regulator\n  for some Intel Processors may allow an unauthenticated user to\n  potentially enable denial of service via network access\n- CVE-2023-38575: Non-transparent sharing of return predictor targets\n  between contexts in some Intel Processors may allow an authorized\n  user to potentially enable information disclosure via local access.\n- CVE-2023-28746: Information exposure through microarchitectural\n  state after transient execution from some register files for some\n  Intel Atom Processors may allow an authenticated user to potentially\n  enable information disclosure via local access.\n- CVE-2023-22655 Protection mechanism failure in some 3rd and 4th\n  Generation Intel Xeon Processors when using Intel SGX or Intel TDX\n  may allow a privileged user to potentially enable escalation of\n  privilege via local access.\n- CVE-2023-43490: Incorrect calculation in microcode keying mechanism\n  for some Intel Xeon D Processors with Intel® SGX may allow a\n  privileged user to potentially enable information disclosure via\n  local access.\n","id":"SUSE-SU-2024:0917-1","modified":"2024-03-18T08:13:13Z","published":"2024-03-18T08:13:13Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240917-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-22655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-28746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-43490"}],"related":["CVE-2023-22655","CVE-2023-28746","CVE-2023-38575","CVE-2023-39368","CVE-2023-43490"],"summary":"Security update for ucode-intel","upstream":["CVE-2023-22655","CVE-2023-28746","CVE-2023-38575","CVE-2023-39368","CVE-2023-43490"]}