Security update for ucode-intel
| Announcement ID: | SUSE-SU-2025:20058-1 |
|---|---|
| Release Date: | 2025-02-03T08:57:28Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for ucode-intel fixes the following issues:
-
Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)
-
CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.
- CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access
### New Platforms:
| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |
|---|---|---|---|---|---|
| TWL | N0 | 06-be-00/19 | 0000001a | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E |
### Updated Platforms:
| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |
|---|---|---|---|---|---|
| ADL | C0 | 06-97-02/07 | 00000035 | 00000036 | Core Gen12 |
| ADL | H0 | 06-97-05/07 | 00000035 | 00000036 | Core Gen12 |
| ADL | L0 | 06-9a-03/80 | 00000433 | 00000434 | Core Gen12 |
| ADL | R0 | 06-9a-04/80 | 00000433 | 00000434 | Core Gen12 |
| ADL-N | N0 | 06-be-00/11 | 00000017 | 0000001a | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E |
| MTL | C0 | 06-aa-04/e6 | 0000001e | 0000001f | Core Ultra Processor |
| RPL-E/HX/S | B0 | 06-b7-01/32 | 00000123 | 00000129 | Core Gen13/Gen14 |
| RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004121 | 00004122 | Core Gen13 |
| RPL-HX/S | C0 | 06-bf-02/07 | 00000035 | 00000036 | Core Gen13/Gen14 |
| RPL-S | H0 | 06-bf-05/07 | 00000035 | 00000036 | Core Gen13/Gen14 |
| RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004121 | 00004122 | Core Gen13 |
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-54=1
Package List:
-
SUSE Linux Micro 6.0 (x86_64)
- ucode-intel-20240910-1.1