{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"microcode_ctl security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for microcode_ctl is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"This is a tool to transform and deploy microcode update for x86 CPUs.\n\nSecurity Fix(es):\n\nImproper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-34440)\n\nImproper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-43758)\n\nImproper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.(CVE-2024-24582)\n\nImproper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.(CVE-2024-28047)\n\nImproper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-28127)\n\nImproper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-29214)\n\nImproper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of service via local access.(CVE-2024-31068)\n\nImproper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.(CVE-2024-31157)\n\nImproper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.(CVE-2024-36293)\n\nSequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2024-37020)\n\nInsufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.(CVE-2024-39279)\n\nImproper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.(CVE-2024-39355)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for microcode_ctl is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"microcode_ctl",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1171",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
			},
			{
				"summary":"CVE-2023-34440",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-34440&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2023-43758",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-43758&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-24582",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-24582&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-28047",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-28047&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-28127",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-28127&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-29214",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-29214&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-31068",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-31068&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-31157",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-31157&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-36293",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-36293&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-37020",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-37020&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-39279",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39279&packageName=microcode_ctl"
			},
			{
				"summary":"CVE-2024-39355",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-39355&packageName=microcode_ctl"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34440"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-43758"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24582"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28047"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28127"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29214"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31068"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31157"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36293"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-37020"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39279"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39355"
			},
			{
				"summary":"openEuler-SA-2025-1171 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1171.json"
			}
		],
		"title":"An update for microcode_ctl is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2025-02-21T21:35:37+08:00",
			"revision_history":[
				{
					"date":"2025-02-21T21:35:37+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-02-21T21:35:37+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-02-21T21:35:37+08:00",
			"id":"openEuler-SA-2025-1171",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"openEuler-20.03-LTS-SP4",
									"name":"openEuler-20.03-LTS-SP4"
								},
								"name":"openEuler-20.03-LTS-SP4",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"openEuler-22.03-LTS-SP4",
									"name":"openEuler-22.03-LTS-SP4"
								},
								"name":"openEuler-22.03-LTS-SP4",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"openEuler-24.03-LTS-SP1",
									"name":"openEuler-24.03-LTS-SP1"
								},
								"name":"openEuler-24.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"microcode_ctl-20250211-1.oe2003sp4.src.rpm",
									"name":"microcode_ctl-20250211-1.oe2003sp4.src.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2003sp4.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"microcode_ctl-20250211-1.oe2203sp3.src.rpm",
									"name":"microcode_ctl-20250211-1.oe2203sp3.src.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2203sp3.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"microcode_ctl-20250211-1.oe2203sp4.src.rpm",
									"name":"microcode_ctl-20250211-1.oe2203sp4.src.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2203sp4.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"microcode_ctl-20250211-1.oe2403.src.rpm",
									"name":"microcode_ctl-20250211-1.oe2403.src.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2403.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"microcode_ctl-20250211-1.oe2403sp1.src.rpm",
									"name":"microcode_ctl-20250211-1.oe2403sp1.src.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2403sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"microcode_ctl-20250211-1.oe2003sp4.x86_64.rpm",
									"name":"microcode_ctl-20250211-1.oe2003sp4.x86_64.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2003sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"microcode_ctl-20250211-1.oe2203sp3.x86_64.rpm",
									"name":"microcode_ctl-20250211-1.oe2203sp3.x86_64.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"microcode_ctl-20250211-1.oe2203sp4.x86_64.rpm",
									"name":"microcode_ctl-20250211-1.oe2203sp4.x86_64.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"microcode_ctl-20250211-1.oe2403.x86_64.rpm",
									"name":"microcode_ctl-20250211-1.oe2403.x86_64.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"microcode_ctl-20250211-1.oe2403sp1.x86_64.rpm",
									"name":"microcode_ctl-20250211-1.oe2403sp1.x86_64.rpm"
								},
								"name":"microcode_ctl-20250211-1.oe2403sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"microcode_ctl-20250211-1.oe2003sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"name":"microcode_ctl-20250211-1.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"microcode_ctl-20250211-1.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"name":"microcode_ctl-20250211-1.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"microcode_ctl-20250211-1.oe2203sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"name":"microcode_ctl-20250211-1.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"microcode_ctl-20250211-1.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"name":"microcode_ctl-20250211-1.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"microcode_ctl-20250211-1.oe2403sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"name":"microcode_ctl-20250211-1.oe2403sp1.src as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"microcode_ctl-20250211-1.oe2003sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"name":"microcode_ctl-20250211-1.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"microcode_ctl-20250211-1.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"name":"microcode_ctl-20250211-1.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"microcode_ctl-20250211-1.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"name":"microcode_ctl-20250211-1.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"microcode_ctl-20250211-1.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"name":"microcode_ctl-20250211-1.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"microcode_ctl-20250211-1.oe2403sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64",
					"name":"microcode_ctl-20250211-1.oe2403sp1.x86_64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-34440",
			"notes":[
				{
					"text":"Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-34440"
		},
		{
			"cve":"CVE-2023-43758",
			"notes":[
				{
					"text":"Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.2,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-43758"
		},
		{
			"cve":"CVE-2024-24582",
			"notes":[
				{
					"text":"Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-24582"
		},
		{
			"cve":"CVE-2024-28047",
			"notes":[
				{
					"text":"Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-28047"
		},
		{
			"cve":"CVE-2024-28127",
			"notes":[
				{
					"text":"Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-28127"
		},
		{
			"cve":"CVE-2024-29214",
			"notes":[
				{
					"text":"Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2024-29214"
		},
		{
			"cve":"CVE-2024-31068",
			"notes":[
				{
					"text":"Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of service via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-31068"
		},
		{
			"cve":"CVE-2024-31157",
			"notes":[
				{
					"text":"Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-31157"
		},
		{
			"cve":"CVE-2024-36293",
			"notes":[
				{
					"text":"Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-36293"
		},
		{
			"cve":"CVE-2024-37020",
			"notes":[
				{
					"text":"Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.8,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2024-37020"
		},
		{
			"cve":"CVE-2024-39279",
			"notes":[
				{
					"text":"Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39279"
		},
		{
			"cve":"CVE-2024-39355",
			"notes":[
				{
					"text":"Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
					"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
					"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
					"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
					"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					],
					"details":"microcode_ctl security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1171"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.src",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.src",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.src",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.src",
						"openEuler-20.03-LTS-SP4:microcode_ctl-20250211-1.oe2003sp4.x86_64",
						"openEuler-22.03-LTS-SP3:microcode_ctl-20250211-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP4:microcode_ctl-20250211-1.oe2203sp4.x86_64",
						"openEuler-24.03-LTS:microcode_ctl-20250211-1.oe2403.x86_64",
						"openEuler-24.03-LTS-SP1:microcode_ctl-20250211-1.oe2403sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-39355"
		}
	]
}