<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ucode-intel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:01651-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-22T08:52:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-22T08:52:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-22T08:52:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ucode-intel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ucode-intel fixes the following issues:

Intel CPU Microcode was updated to the 20250512 release (bsc#1243123)
  
- CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20103: Insufficient resource pool in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2025-20054: Uncaught exception in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2024-43420: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20623: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2024-45332: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-24495: Incorrect initialization of resource in the branch prediction unit for some Intel Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20012: Incorrect behavior order for some Intel Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.
- Updates for functional issues.  
    
- New Platforms

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ARL-U          | A1       | 06-b5-00/80 |          | 0000000a | Core Ultra Processor (Series2)
  | ARL-S/HX (8P)  | B0       | 06-c6-02/82 |          | 00000118 | Core Ultra Processor (Series2)
  | ARL-H          | A1       | 06-c5-02/82 |          | 00000118 | Core Ultra Processor (Series2)
  | GNR-AP/SP      | B0       | 06-ad-01/95 |          | 010003a2 | Xeon Scalable Gen6
  | GNR-AP/SP      | H0       | 06-ad-01/20 |          | 0a0000d1 | Xeon Scalable Gen6
  | LNL            | B0       | 06-bd-01/80 |          | 0000011f | Core Ultra 200 V Series Processor

- Updated Platforms

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000038 | 0000003a | Core Gen12
  | ADL            | H0       | 06-97-05/07 | 00000038 | 0000003a | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000436 | 00000437 | Core Gen12
  | ADL            | R0       | 06-9a-04/80 | 00000436 | 00000437 | Core Gen12 
  | ADL-N          | N0       | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | AZB            | A0/R0    | 06-9a-04/40 | 00000009 | 0000000a | Intel(R) Atom(R) C1100
  | CFL-H          | R0       | 06-9e-0d/22 | 00000102 | 00000104 | Core Gen9 Mobile
  | CLX-SP         | B1       | 06-55-07/bf | 05003707 | 05003901 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000fc | 00000100 | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000fc | 00000100 | Core Gen10
  | CML-U42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000fe | 00000102 | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002904 | 07002b01 | Xeon Scalable Gen3
  | EMR-SP         | A1       | 06-cf-02/87 | 21000291 | 210002a9 | Xeon Scalable Gen5
  | GLK-R          | R0       | 06-7a-08/01 | 00000024 | 00000026 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-D          | B0       | 06-6c-01/10 | 010002c0 | 010002d0 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000c6 | 000000ca | Core Gen10 Mobile
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003f5 | 0d000404 | Xeon Scalable Gen3
  | MTL            | C0       | 06-aa-04/e6 | 00000020 | 00000024 | Core Ultra Processor
  | RKL-S          | B0       | 06-a7-01/02 | 00000063 | 00000064 | Core Gen11
  | RPL-E/HX/S     | B0       | 06-b7-01/32 | 0000012c | 0000012f | Core Gen13/Gen14
  | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004124 | 00004128 | Core Gen13
  | RPL-HX/S       | C0       | 06-bf-02/07 | 00000038 | 0000003a | Core Gen13/Gen14
  | RPL-S          | H0       | 06-bf-05/07 | 00000038 | 0000003a | Core Gen13/Gen14
  | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004124 | 00004128 | Core Gen13
  | SPR-HBM        | Bx       | 06-8f-08/10 | 2c0003e0 | 2c0003f7 | Xeon Max
  | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4
  | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4
  | SRF-SP         | C0       | 06-af-03/01 | 03000330 | 03000341 | Xeon 6700-Series Processors with E-Cores
  | TGL            | B0/B1    | 06-8c-01/80 | 000000b8 | 000000bc | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000052 | 00000056 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000038 | 0000003c | Core Gen11 Mobile
  | TWL            | N0       | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | WHL-U          | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen8 Mobile
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1651,SUSE-SLE-Micro-5.3-2025-1651,SUSE-SLE-Micro-5.4-2025-1651,SUSE-SLE-Micro-5.5-2025-1651,SUSE-SLE-Module-Basesystem-15-SP6-2025-1651,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1651,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1651,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1651,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1651,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1651,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1651,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1651,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1651,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1651,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1651,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1651,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1651,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1651,SUSE-SUSE-MicroOS-5.1-2025-1651,SUSE-SUSE-MicroOS-5.2-2025-1651,SUSE-Storage-7.1-2025-1651,openSUSE-SLE-15.6-2025-1651</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      <Description>Link for SUSE-SU-2025:01651-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:01651-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1243123</URL>
      <Description>SUSE Bug 1243123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-28956/</URL>
      <Description>SUSE CVE CVE-2024-28956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-43420/</URL>
      <Description>SUSE CVE CVE-2024-43420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45332/</URL>
      <Description>SUSE CVE CVE-2024-45332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-20012/</URL>
      <Description>SUSE CVE CVE-2025-20012 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-20054/</URL>
      <Description>SUSE CVE CVE-2025-20054 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-20103/</URL>
      <Description>SUSE CVE CVE-2025-20103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-20623/</URL>
      <Description>SUSE CVE CVE-2025-20623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-24495/</URL>
      <Description>SUSE CVE CVE-2025-24495 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp4">SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp5">SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp5">SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.1">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1" CPE="cpe:/o:suse:suse-microos:5.1">SUSE Linux Enterprise Micro 5.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.3">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3" CPE="cpe:/o:suse:sle-micro:5.3">SUSE Linux Enterprise Micro 5.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.4">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4" CPE="cpe:/o:suse:sle-micro:5.4">SUSE Linux Enterprise Micro 5.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.5">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5" CPE="cpe:/o:suse:sle-micro:5.5">SUSE Linux Enterprise Micro 5.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6" CPE="cpe:/o:suse:sle-module-basesystem:15:sp6">SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp4">SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp5">SUSE Linux Enterprise Server 15 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4" CPE="cpe:/o:suse:sles_sap:15:sp4">SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP5" CPE="cpe:/o:suse:sles_sap:15:sp5">SUSE Linux Enterprise Server for SAP Applications 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 4.3">
        <FullProductName ProductID="SUSE Manager Proxy 4.3" CPE="cpe:/o:suse:suse-manager-proxy:4.3">SUSE Manager Proxy 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Server 4.3">
        <FullProductName ProductID="SUSE Manager Server 4.3" CPE="cpe:/o:suse:suse-manager-server:4.3">SUSE Manager Server 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ucode-intel-20250512-150200.56.1">
      <FullProductName ProductID="ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.5">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Micro 5.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Server 15 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 4.3">
      <FullProductName ProductID="SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Manager Proxy 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server 4.3">
      <FullProductName ProductID="SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of SUSE Manager Server 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ucode-intel-20250512-150200.56.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1">ucode-intel-20250512-150200.56.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2024-28956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-28956.html</URL>
        <Description>CVE-2024-28956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2024-43420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-43420.html</URL>
        <Description>CVE-2024-43420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243451</URL>
        <Description>SUSE Bug 1243451</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2024-45332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45332.html</URL>
        <Description>CVE-2024-45332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243180</URL>
        <Description>SUSE Bug 1243180</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect behavior order for some Intel(R) Core(tm) Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.</Note>
    </Notes>
    <CVE>CVE-2025-20012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-20012.html</URL>
        <Description>CVE-2025-20012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243123</URL>
        <Description>SUSE Bug 1243123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.</Note>
    </Notes>
    <CVE>CVE-2025-20054</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-20054.html</URL>
        <Description>CVE-2025-20054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243123</URL>
        <Description>SUSE Bug 1243123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.</Note>
    </Notes>
    <CVE>CVE-2025-20103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-20103.html</URL>
        <Description>CVE-2025-20103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243123</URL>
        <Description>SUSE Bug 1243123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core(tm) processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2025-20623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-20623.html</URL>
        <Description>CVE-2025-20623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243454</URL>
        <Description>SUSE Bug 1243454</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core(tm) Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2025-24495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP6:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP4-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP5-LTSS:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP4:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP5:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Proxy 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>SUSE Manager Server 4.3:ucode-intel-20250512-150200.56.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ucode-intel-20250512-150200.56.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202501651-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-24495.html</URL>
        <Description>CVE-2025-24495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1242006</URL>
        <Description>SUSE Bug 1242006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243123</URL>
        <Description>SUSE Bug 1243123</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
