SUSE-SU-2026:21725-1: moderate: Security update for ucode-intel
SLE-UPDATES
null at suse.de
Fri May 22 12:31:04 UTC 2026
# Security update for ucode-intel
Announcement ID: SUSE-SU-2026:21725-1
Release Date: 2026-05-21T09:27:26Z
Rating: moderate
References:
* bsc#1230400
* bsc#1249138
* bsc#1253319
* bsc#1265189
Cross-References:
* CVE-2025-35979
CVSS scores:
* CVE-2025-35979 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-35979 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-35979 ( NVD ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* SUSE Linux Micro 6.0
An update that solves one vulnerability and has three fixes can now be
installed.
## Description:
This update for ucode-intel fixes the following issues
Security issue:
* CVE-2025-35979: data leaks fixed in 20260512 release (bsc#1265189).
Non security issues:
* TW 20250826 Kernel 6.16.3 tainted with value of 4 after reboot.
(bsc#1249138).
* Intel CPU Microcode was updated to the 20260512 release (bsc#1265189) ###
New Platforms | Processor | Stepping | F-M-S/PI | Old Ver | New Ver |
Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| PTL 404 | A1 | 06-cc-03/90 | | 0000011b | Intel Core Ultra Processor
(Series 3) | PTL-H 484/12Xe | A0/B0 | 06-cc-02/90 | | 0000011b | Intel Core
Ultra Processor (Series 3) ### Updated Platforms | ARL-H | A1 | 06-c5-02/82
| 0000011b | 00000121 | Core Ultra Processor (Series 2) | ARL-S/HX (8P) | B0
| 06-c6-02/82 | 0000011b | 00000121 | Core Ultra Processor (Series 2) | EMR-
SP | A1 | 06-cf-02/87 | 210002d3 | 210002e0 | Xeon Scalable Gen5 | GNR-AP/SP
| Bx/Hx/Lx | 06-ad-01/95 | 01000405 | 01000423 | Xeon 6900/6700/6500 Series
Processors with P-Cores | GNR-D | B0/B1 | 06-ae-01/97 | 01000303 | 01000307
| Xeon 6700P-B/6500P-B Series SoC with P-Cores | GNR-SP R1S | Bx/Hx/Lx |
06-ad-01/20 | 0a000133 | 0a000142 | Xeon 6700/6500-Series Processors with
P-Cores | LNL | B0 | 06-bd-01/80 | 00000125 | 00000126 | Core Ultra 200 V
Series Processor | SPR-SP | E4/S2 | 06-8f-07/87 | 2b000661 | 2b000670 | Xeon
Scalable Gen4 | SPR-SP | E5/S3 | 06-8f-08/87 | 2b000661 | 2b000670 | Xeon
Scalable Gen4 | SRF-AP/SP | C0 | 06-af-03/01 | 03000382 | 030003a3 | Xeon
6900/6700-Series Processors with E-Cores
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-719=1
## Package List:
* SUSE Linux Micro 6.0 (x86_64)
* ucode-intel-20260512-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-35979.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230400
* https://bugzilla.suse.com/show_bug.cgi?id=1249138
* https://bugzilla.suse.com/show_bug.cgi?id=1253319
* https://bugzilla.suse.com/show_bug.cgi?id=1265189
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20260522/258e1e9b/attachment.htm>
More information about the sle-updates
mailing list