{"affected":[{"ecosystem_specific":{"binaries":[{"ucode-intel":"20240910-143.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20240910-143.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ucode-intel":"20240910-143.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"ucode-intel","purl":"pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20240910-143.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ucode-intel fixes the following issues:\n\n- Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)\n- CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.\n- CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access.\n","id":"SUSE-SU-2024:3307-1","modified":"2024-09-18T12:54:54Z","published":"2024-09-18T12:54:54Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243307-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-24968"}],"related":["CVE-2024-23984","CVE-2024-24968"],"summary":"Security update for ucode-intel","upstream":["CVE-2024-23984","CVE-2024-24968"]}