SUSE-SU-2026:20522-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620522-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20522-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:20522-1
Upstream
  • CVE-2025-31648
Related
Published
2026-02-26T10:48:45Z
Modified
2026-03-11T07:31:51.970857Z
Summary
Security update for ucode-intel
Details

This update for ucode-intel fixes the following issues:

  • Intel CPU Microcode was updated to the 20260210 release (bsc#1258046):

    • CVE-2024-24853: Updated fix for incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access (bsc#1229129).

    • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel Processor Family may allow an escalation of privilege (bsc#1258046).

References

Affected packages

SUSE:Linux Micro 6.0 / ucode-intel

Package

Name
ucode-intel
Purl
pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Micro%206.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20260210-1.1

Ecosystem specific

{
    "binaries": [
        {
            "ucode-intel": "20260210-1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20522-1.json"