SUSE-SU-2026:21725-1: moderate: Security update for ucode-intel

SLE-UPDATES null at suse.de
Fri May 22 12:31:04 UTC 2026


# Security update for ucode-intel

Announcement ID: SUSE-SU-2026:21725-1  
Release Date: 2026-05-21T09:27:26Z  
Rating: moderate  
References:

  * bsc#1230400
  * bsc#1249138
  * bsc#1253319
  * bsc#1265189

  
Cross-References:

  * CVE-2025-35979

  
CVSS scores:

  * CVE-2025-35979 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-35979 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-35979 ( NVD ):  6.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

  
Affected Products:

  * SUSE Linux Micro 6.0

  
  
An update that solves one vulnerability and has three fixes can now be
installed.

## Description:

This update for ucode-intel fixes the following issues

Security issue:

  * CVE-2025-35979: data leaks fixed in 20260512 release (bsc#1265189).

Non security issues:

  * TW 20250826 Kernel 6.16.3 tainted with value of 4 after reboot.
    (bsc#1249138).
  * Intel CPU Microcode was updated to the 20260512 release (bsc#1265189) ###
    New Platforms | Processor | Stepping | F-M-S/PI | Old Ver | New Ver |
    Products
    |:---------------|:---------|:------------|:---------|:---------|:---------
    | PTL 404 | A1 | 06-cc-03/90 | | 0000011b | Intel Core Ultra Processor
    (Series 3) | PTL-H 484/12Xe | A0/B0 | 06-cc-02/90 | | 0000011b | Intel Core
    Ultra Processor (Series 3) ### Updated Platforms | ARL-H | A1 | 06-c5-02/82
    | 0000011b | 00000121 | Core Ultra Processor (Series 2) | ARL-S/HX (8P) | B0
    | 06-c6-02/82 | 0000011b | 00000121 | Core Ultra Processor (Series 2) | EMR-
    SP | A1 | 06-cf-02/87 | 210002d3 | 210002e0 | Xeon Scalable Gen5 | GNR-AP/SP
    | Bx/Hx/Lx | 06-ad-01/95 | 01000405 | 01000423 | Xeon 6900/6700/6500 Series
    Processors with P-Cores | GNR-D | B0/B1 | 06-ae-01/97 | 01000303 | 01000307
    | Xeon 6700P-B/6500P-B Series SoC with P-Cores | GNR-SP R1S | Bx/Hx/Lx |
    06-ad-01/20 | 0a000133 | 0a000142 | Xeon 6700/6500-Series Processors with
    P-Cores | LNL | B0 | 06-bd-01/80 | 00000125 | 00000126 | Core Ultra 200 V
    Series Processor | SPR-SP | E4/S2 | 06-8f-07/87 | 2b000661 | 2b000670 | Xeon
    Scalable Gen4 | SPR-SP | E5/S3 | 06-8f-08/87 | 2b000661 | 2b000670 | Xeon
    Scalable Gen4 | SRF-AP/SP | C0 | 06-af-03/01 | 03000382 | 030003a3 | Xeon
    6900/6700-Series Processors with E-Cores

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.0  
    zypper in -t patch SUSE-SLE-Micro-6.0-719=1

## Package List:

  * SUSE Linux Micro 6.0 (x86_64)
    * ucode-intel-20260512-1.1

## References:

  * https://www.suse.com/security/cve/CVE-2025-35979.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1230400
  * https://bugzilla.suse.com/show_bug.cgi?id=1249138
  * https://bugzilla.suse.com/show_bug.cgi?id=1253319
  * https://bugzilla.suse.com/show_bug.cgi?id=1265189

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20260522/258e1e9b/attachment.htm>


More information about the sle-updates mailing list