{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"ucode-intel-20210608-1.2 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the ucode-intel-20210608-1.2 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-11478","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11478-1.json"},{"category":"self","summary":"SUSE CVE CVE-2017-5715 page","url":"https://www.suse.com/security/cve/CVE-2017-5715/"},{"category":"self","summary":"SUSE CVE CVE-2018-12126 page","url":"https://www.suse.com/security/cve/CVE-2018-12126/"},{"category":"self","summary":"SUSE CVE CVE-2018-12130 page","url":"https://www.suse.com/security/cve/CVE-2018-12130/"},{"category":"self","summary":"SUSE CVE CVE-2018-3640 page","url":"https://www.suse.com/security/cve/CVE-2018-3640/"},{"category":"self","summary":"SUSE CVE CVE-2019-11135 page","url":"https://www.suse.com/security/cve/CVE-2019-11135/"},{"category":"self","summary":"SUSE CVE CVE-2019-11139 page","url":"https://www.suse.com/security/cve/CVE-2019-11139/"},{"category":"self","summary":"SUSE CVE CVE-2020-0543 page","url":"https://www.suse.com/security/cve/CVE-2020-0543/"},{"category":"self","summary":"SUSE CVE CVE-2020-0548 page","url":"https://www.suse.com/security/cve/CVE-2020-0548/"},{"category":"self","summary":"SUSE CVE CVE-2020-24489 page","url":"https://www.suse.com/security/cve/CVE-2020-24489/"},{"category":"self","summary":"SUSE CVE CVE-2020-24511 page","url":"https://www.suse.com/security/cve/CVE-2020-24511/"},{"category":"self","summary":"SUSE CVE CVE-2020-24512 page","url":"https://www.suse.com/security/cve/CVE-2020-24512/"},{"category":"self","summary":"SUSE CVE CVE-2020-24513 page","url":"https://www.suse.com/security/cve/CVE-2020-24513/"},{"category":"self","summary":"SUSE CVE CVE-2020-8695 page","url":"https://www.suse.com/security/cve/CVE-2020-8695/"},{"category":"self","summary":"SUSE CVE CVE-2020-8696 page","url":"https://www.suse.com/security/cve/CVE-2020-8696/"},{"category":"self","summary":"SUSE CVE CVE-2020-8698 page","url":"https://www.suse.com/security/cve/CVE-2020-8698/"}],"title":"ucode-intel-20210608-1.2 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:11478-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"ucode-intel-20210608-1.2.aarch64","product":{"name":"ucode-intel-20210608-1.2.aarch64","product_id":"ucode-intel-20210608-1.2.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"ucode-intel-20210608-1.2.ppc64le","product":{"name":"ucode-intel-20210608-1.2.ppc64le","product_id":"ucode-intel-20210608-1.2.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"ucode-intel-20210608-1.2.s390x","product":{"name":"ucode-intel-20210608-1.2.s390x","product_id":"ucode-intel-20210608-1.2.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"ucode-intel-20210608-1.2.x86_64","product":{"name":"ucode-intel-20210608-1.2.x86_64","product_id":"ucode-intel-20210608-1.2.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"ucode-intel-20210608-1.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64"},"product_reference":"ucode-intel-20210608-1.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ucode-intel-20210608-1.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le"},"product_reference":"ucode-intel-20210608-1.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ucode-intel-20210608-1.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x"},"product_reference":"ucode-intel-20210608-1.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ucode-intel-20210608-1.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"},"product_reference":"ucode-intel-20210608-1.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2017-5715","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5715"}],"notes":[{"category":"general","text":"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5715","url":"https://www.suse.com/security/cve/CVE-2017-5715"},{"category":"external","summary":"SUSE Bug 1068032 for CVE-2017-5715","url":"https://bugzilla.suse.com/1068032"},{"category":"external","summary":"SUSE Bug 1074562 for CVE-2017-5715","url":"https://bugzilla.suse.com/1074562"},{"category":"external","summary":"SUSE Bug 1074578 for CVE-2017-5715","url":"https://bugzilla.suse.com/1074578"},{"category":"external","summary":"SUSE Bug 1074701 for CVE-2017-5715","url":"https://bugzilla.suse.com/1074701"},{"category":"external","summary":"SUSE Bug 1074741 for CVE-2017-5715","url":"https://bugzilla.suse.com/1074741"},{"category":"external","summary":"SUSE Bug 1074919 for CVE-2017-5715","url":"https://bugzilla.suse.com/1074919"},{"category":"external","summary":"SUSE Bug 1075006 for CVE-2017-5715","url":"https://bugzilla.suse.com/1075006"},{"category":"external","summary":"SUSE Bug 1075007 for CVE-2017-5715","url":"https://bugzilla.suse.com/1075007"},{"category":"external","summary":"SUSE Bug 1075262 for CVE-2017-5715","url":"https://bugzilla.suse.com/1075262"},{"category":"external","summary":"SUSE Bug 1075419 for CVE-2017-5715","url":"https://bugzilla.suse.com/1075419"},{"category":"external","summary":"SUSE Bug 1076115 for CVE-2017-5715","url":"https://bugzilla.suse.com/1076115"},{"category":"external","summary":"SUSE Bug 1076372 for CVE-2017-5715","url":"https://bugzilla.suse.com/1076372"},{"category":"external","summary":"SUSE Bug 1076606 for CVE-2017-5715","url":"https://bugzilla.suse.com/1076606"},{"category":"external","summary":"SUSE Bug 1078353 for CVE-2017-5715","url":"https://bugzilla.suse.com/1078353"},{"category":"external","summary":"SUSE Bug 1080039 for CVE-2017-5715","url":"https://bugzilla.suse.com/1080039"},{"category":"external","summary":"SUSE Bug 1087887 for CVE-2017-5715","url":"https://bugzilla.suse.com/1087887"},{"category":"external","summary":"SUSE Bug 1087939 for CVE-2017-5715","url":"https://bugzilla.suse.com/1087939"},{"category":"external","summary":"SUSE Bug 1088147 for CVE-2017-5715","url":"https://bugzilla.suse.com/1088147"},{"category":"external","summary":"SUSE Bug 1089055 for CVE-2017-5715","url":"https://bugzilla.suse.com/1089055"},{"category":"external","summary":"SUSE Bug 1091815 for CVE-2017-5715","url":"https://bugzilla.suse.com/1091815"},{"category":"external","summary":"SUSE Bug 1095735 for CVE-2017-5715","url":"https://bugzilla.suse.com/1095735"},{"category":"external","summary":"SUSE Bug 1102517 for CVE-2017-5715","url":"https://bugzilla.suse.com/1102517"},{"category":"external","summary":"SUSE Bug 1105108 for CVE-2017-5715","url":"https://bugzilla.suse.com/1105108"},{"category":"external","summary":"SUSE Bug 1126516 for CVE-2017-5715","url":"https://bugzilla.suse.com/1126516"},{"category":"external","summary":"SUSE Bug 1173489 for CVE-2017-5715","url":"https://bugzilla.suse.com/1173489"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2017-5715","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 1201457 for CVE-2017-5715","url":"https://bugzilla.suse.com/1201457"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2017-5715","url":"https://bugzilla.suse.com/1201877"},{"category":"external","summary":"SUSE Bug 1203236 for CVE-2017-5715","url":"https://bugzilla.suse.com/1203236"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2017-5715"},{"cve":"CVE-2018-12126","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-12126"}],"notes":[{"category":"general","text":"Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-12126","url":"https://www.suse.com/security/cve/CVE-2018-12126"},{"category":"external","summary":"SUSE Bug 1103186 for CVE-2018-12126","url":"https://bugzilla.suse.com/1103186"},{"category":"external","summary":"SUSE Bug 1111331 for CVE-2018-12126","url":"https://bugzilla.suse.com/1111331"},{"category":"external","summary":"SUSE Bug 1132686 for CVE-2018-12126","url":"https://bugzilla.suse.com/1132686"},{"category":"external","summary":"SUSE Bug 1135409 for CVE-2018-12126","url":"https://bugzilla.suse.com/1135409"},{"category":"external","summary":"SUSE Bug 1135524 for CVE-2018-12126","url":"https://bugzilla.suse.com/1135524"},{"category":"external","summary":"SUSE Bug 1137916 for CVE-2018-12126","url":"https://bugzilla.suse.com/1137916"},{"category":"external","summary":"SUSE Bug 1138534 for CVE-2018-12126","url":"https://bugzilla.suse.com/1138534"},{"category":"external","summary":"SUSE Bug 1141977 for CVE-2018-12126","url":"https://bugzilla.suse.com/1141977"},{"category":"external","summary":"SUSE Bug 1149725 for CVE-2018-12126","url":"https://bugzilla.suse.com/1149725"},{"category":"external","summary":"SUSE Bug 1149726 for CVE-2018-12126","url":"https://bugzilla.suse.com/1149726"},{"category":"external","summary":"SUSE Bug 1149729 for CVE-2018-12126","url":"https://bugzilla.suse.com/1149729"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2018-12126","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2018-12126","url":"https://bugzilla.suse.com/1201877"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.8,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-12126"},{"cve":"CVE-2018-12130","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-12130"}],"notes":[{"category":"general","text":"Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-12130","url":"https://www.suse.com/security/cve/CVE-2018-12130"},{"category":"external","summary":"SUSE Bug 1103186 for CVE-2018-12130","url":"https://bugzilla.suse.com/1103186"},{"category":"external","summary":"SUSE Bug 1111331 for CVE-2018-12130","url":"https://bugzilla.suse.com/1111331"},{"category":"external","summary":"SUSE Bug 1132686 for CVE-2018-12130","url":"https://bugzilla.suse.com/1132686"},{"category":"external","summary":"SUSE Bug 1135409 for CVE-2018-12130","url":"https://bugzilla.suse.com/1135409"},{"category":"external","summary":"SUSE Bug 1137916 for CVE-2018-12130","url":"https://bugzilla.suse.com/1137916"},{"category":"external","summary":"SUSE Bug 1138534 for CVE-2018-12130","url":"https://bugzilla.suse.com/1138534"},{"category":"external","summary":"SUSE Bug 1141977 for CVE-2018-12130","url":"https://bugzilla.suse.com/1141977"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2018-12130","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2018-12130","url":"https://bugzilla.suse.com/1201877"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-12130"},{"cve":"CVE-2018-3640","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-3640"}],"notes":[{"category":"general","text":"Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-3640","url":"https://www.suse.com/security/cve/CVE-2018-3640"},{"category":"external","summary":"SUSE Bug 1074701 for CVE-2018-3640","url":"https://bugzilla.suse.com/1074701"},{"category":"external","summary":"SUSE Bug 1087078 for CVE-2018-3640","url":"https://bugzilla.suse.com/1087078"},{"category":"external","summary":"SUSE Bug 1087083 for CVE-2018-3640","url":"https://bugzilla.suse.com/1087083"},{"category":"external","summary":"SUSE Bug 1094912 for CVE-2018-3640","url":"https://bugzilla.suse.com/1094912"},{"category":"external","summary":"SUSE Bug 1098813 for CVE-2018-3640","url":"https://bugzilla.suse.com/1098813"},{"category":"external","summary":"SUSE Bug 1100394 for CVE-2018-3640","url":"https://bugzilla.suse.com/1100394"},{"category":"external","summary":"SUSE Bug 1115893 for CVE-2018-3640","url":"https://bugzilla.suse.com/1115893"},{"category":"external","summary":"SUSE Bug 1175912 for CVE-2018-3640","url":"https://bugzilla.suse.com/1175912"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2018-3640","url":"https://bugzilla.suse.com/1201877"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-3640"},{"cve":"CVE-2019-11135","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-11135"}],"notes":[{"category":"general","text":"TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-11135","url":"https://www.suse.com/security/cve/CVE-2019-11135"},{"category":"external","summary":"SUSE Bug 1139073 for CVE-2019-11135","url":"https://bugzilla.suse.com/1139073"},{"category":"external","summary":"SUSE Bug 1152497 for CVE-2019-11135","url":"https://bugzilla.suse.com/1152497"},{"category":"external","summary":"SUSE Bug 1152505 for CVE-2019-11135","url":"https://bugzilla.suse.com/1152505"},{"category":"external","summary":"SUSE Bug 1152506 for CVE-2019-11135","url":"https://bugzilla.suse.com/1152506"},{"category":"external","summary":"SUSE Bug 1160120 for CVE-2019-11135","url":"https://bugzilla.suse.com/1160120"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2019-11135","url":"https://bugzilla.suse.com/1201877"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-11135"},{"cve":"CVE-2019-11139","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-11139"}],"notes":[{"category":"general","text":"Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-11139","url":"https://www.suse.com/security/cve/CVE-2019-11139"},{"category":"external","summary":"SUSE Bug 1141035 for CVE-2019-11139","url":"https://bugzilla.suse.com/1141035"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-11139"},{"cve":"CVE-2020-0543","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-0543"}],"notes":[{"category":"general","text":"Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-0543","url":"https://www.suse.com/security/cve/CVE-2020-0543"},{"category":"external","summary":"SUSE Bug 1154824 for CVE-2020-0543","url":"https://bugzilla.suse.com/1154824"},{"category":"external","summary":"SUSE Bug 1172205 for CVE-2020-0543","url":"https://bugzilla.suse.com/1172205"},{"category":"external","summary":"SUSE Bug 1172206 for CVE-2020-0543","url":"https://bugzilla.suse.com/1172206"},{"category":"external","summary":"SUSE Bug 1172207 for CVE-2020-0543","url":"https://bugzilla.suse.com/1172207"},{"category":"external","summary":"SUSE Bug 1172770 for CVE-2020-0543","url":"https://bugzilla.suse.com/1172770"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2020-0543","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2020-0543","url":"https://bugzilla.suse.com/1201877"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-0543"},{"cve":"CVE-2020-0548","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-0548"}],"notes":[{"category":"general","text":"Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-0548","url":"https://www.suse.com/security/cve/CVE-2020-0548"},{"category":"external","summary":"SUSE Bug 1156353 for CVE-2020-0548","url":"https://bugzilla.suse.com/1156353"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.8,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-0548"},{"cve":"CVE-2020-24489","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-24489"}],"notes":[{"category":"general","text":"Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-24489","url":"https://www.suse.com/security/cve/CVE-2020-24489"},{"category":"external","summary":"SUSE Bug 1179839 for CVE-2020-24489","url":"https://bugzilla.suse.com/1179839"},{"category":"external","summary":"SUSE Bug 1192359 for CVE-2020-24489","url":"https://bugzilla.suse.com/1192359"},{"category":"external","summary":"SUSE Bug 1199300 for CVE-2020-24489","url":"https://bugzilla.suse.com/1199300"},{"category":"external","summary":"SUSE Bug 1201731 for CVE-2020-24489","url":"https://bugzilla.suse.com/1201731"},{"category":"external","summary":"SUSE Bug 1225680 for CVE-2020-24489","url":"https://bugzilla.suse.com/1225680"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2020-24489"},{"cve":"CVE-2020-24511","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-24511"}],"notes":[{"category":"general","text":"Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-24511","url":"https://www.suse.com/security/cve/CVE-2020-24511"},{"category":"external","summary":"SUSE Bug 1179836 for CVE-2020-24511","url":"https://bugzilla.suse.com/1179836"},{"category":"external","summary":"SUSE Bug 1192360 for CVE-2020-24511","url":"https://bugzilla.suse.com/1192360"},{"category":"external","summary":"SUSE Bug 1199300 for CVE-2020-24511","url":"https://bugzilla.suse.com/1199300"},{"category":"external","summary":"SUSE Bug 1201731 for CVE-2020-24511","url":"https://bugzilla.suse.com/1201731"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-24511"},{"cve":"CVE-2020-24512","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-24512"}],"notes":[{"category":"general","text":"Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-24512","url":"https://www.suse.com/security/cve/CVE-2020-24512"},{"category":"external","summary":"SUSE Bug 1179837 for CVE-2020-24512","url":"https://bugzilla.suse.com/1179837"},{"category":"external","summary":"SUSE Bug 1192360 for CVE-2020-24512","url":"https://bugzilla.suse.com/1192360"},{"category":"external","summary":"SUSE Bug 1199300 for CVE-2020-24512","url":"https://bugzilla.suse.com/1199300"},{"category":"external","summary":"SUSE Bug 1201731 for CVE-2020-24512","url":"https://bugzilla.suse.com/1201731"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.8,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2020-24512"},{"cve":"CVE-2020-24513","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-24513"}],"notes":[{"category":"general","text":"Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-24513","url":"https://www.suse.com/security/cve/CVE-2020-24513"},{"category":"external","summary":"SUSE Bug 1179833 for CVE-2020-24513","url":"https://bugzilla.suse.com/1179833"},{"category":"external","summary":"SUSE Bug 1192360 for CVE-2020-24513","url":"https://bugzilla.suse.com/1192360"},{"category":"external","summary":"SUSE Bug 1199300 for CVE-2020-24513","url":"https://bugzilla.suse.com/1199300"},{"category":"external","summary":"SUSE Bug 1201731 for CVE-2020-24513","url":"https://bugzilla.suse.com/1201731"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-24513"},{"cve":"CVE-2020-8695","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8695"}],"notes":[{"category":"general","text":"Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-8695","url":"https://www.suse.com/security/cve/CVE-2020-8695"},{"category":"external","summary":"SUSE Bug 1170415 for CVE-2020-8695","url":"https://bugzilla.suse.com/1170415"},{"category":"external","summary":"SUSE Bug 1170446 for CVE-2020-8695","url":"https://bugzilla.suse.com/1170446"},{"category":"external","summary":"SUSE Bug 1178591 for CVE-2020-8695","url":"https://bugzilla.suse.com/1178591"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-8695"},{"cve":"CVE-2020-8696","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8696"}],"notes":[{"category":"general","text":"Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-8696","url":"https://www.suse.com/security/cve/CVE-2020-8696"},{"category":"external","summary":"SUSE Bug 1173592 for CVE-2020-8696","url":"https://bugzilla.suse.com/1173592"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.5,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-8696"},{"cve":"CVE-2020-8698","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8698"}],"notes":[{"category":"general","text":"Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2020-8698","url":"https://www.suse.com/security/cve/CVE-2020-8698"},{"category":"external","summary":"SUSE Bug 1173594 for CVE-2020-8698","url":"https://bugzilla.suse.com/1173594"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.5,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64","openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le","openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x","openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2020-8698"}]}