SUSE-SU-2024:3307-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20243307-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:3307-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2024:3307-1
Related
Published
2024-09-18T12:54:54Z
Modified
2024-09-18T12:54:54Z
Summary
Security update for ucode-intel
Details

This update for ucode-intel fixes the following issues:

  • Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)
  • CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.
  • CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access.
References

Affected packages

SUSE:Linux Enterprise Server 12 SP5 / ucode-intel

Package

Name
ucode-intel
Purl
pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20240910-143.1

Ecosystem specific

{
    "binaries": [
        {
            "ucode-intel": "20240910-143.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP5 / ucode-intel

Package

Name
ucode-intel
Purl
pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20240910-143.1

Ecosystem specific

{
    "binaries": [
        {
            "ucode-intel": "20240910-143.1"
        }
    ]
}