2024-12-12 21:07:30 +00:00

226 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20248656",
"Version": "oval:org.altlinux.errata:def:20248656",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-8656: package `firmware-intel-ucode` update to version 26-alt1.20240531",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-8656",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-8656",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-02258",
"RefURL": "https://bdu.fstec.ru/vul/2024-02258",
"Source": "BDU"
},
{
"RefID": "BDU:2024-02524",
"RefURL": "https://bdu.fstec.ru/vul/2024-02524",
"Source": "BDU"
},
{
"RefID": "BDU:2024-02527",
"RefURL": "https://bdu.fstec.ru/vul/2024-02527",
"Source": "BDU"
},
{
"RefID": "BDU:2024-02607",
"RefURL": "https://bdu.fstec.ru/vul/2024-02607",
"Source": "BDU"
},
{
"RefID": "CVE-2023-22655",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22655",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28746",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38575",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38575",
"Source": "CVE"
},
{
"RefID": "CVE-2023-39368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39368",
"Source": "CVE"
},
{
"RefID": "CVE-2023-43490",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-43490",
"Source": "CVE"
},
{
"RefID": "CVE-2023-45733",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45733",
"Source": "CVE"
},
{
"RefID": "CVE-2023-45745",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45745",
"Source": "CVE"
},
{
"RefID": "CVE-2023-46103",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46103",
"Source": "CVE"
},
{
"RefID": "CVE-2023-47855",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-47855",
"Source": "CVE"
}
],
"Description": "This update upgrades firmware-intel-ucode to version 26-alt1.20240531. \nSecurity Fix(es):\n\n * BDU:2024-02258: Уязвимость микропрограммного обеспечения процессоров Intel, связанная с утечкой информации из векторных регистров, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2024-02524: Уязвимость микропрограммного обеспечения процессоров Intel, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2024-02527: Уязвимость микропрограммного обеспечения процессоров Intel, связанная с нарушением механизма защиты данных, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2024-02607: Уязвимость микропрограммного обеспечения процессоров Intel Xeon D, связанная с неверным вычислением, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2023-22655: Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.\n\n * CVE-2023-28746: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\n * CVE-2023-38575: Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.\n\n * CVE-2023-39368: Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.\n\n * CVE-2023-43490: Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.\n\n * CVE-2023-45733: Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.\n\n * CVE-2023-45745: Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n * CVE-2023-46103: Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.\n\n * CVE-2023-47855: Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-06-02"
},
"Updated": {
"Date": "2024-06-02"
},
"BDUs": [
{
"ID": "BDU:2024-02258",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-1342",
"Href": "https://bdu.fstec.ru/vul/2024-02258",
"Impact": "Low",
"Public": "20240314"
},
{
"ID": "BDU:2024-02524",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-1303",
"Href": "https://bdu.fstec.ru/vul/2024-02524",
"Impact": "Low",
"Public": "20240314"
},
{
"ID": "BDU:2024-02527",
"CVSS": "AV:L/AC:H/Au:M/C:P/I:C/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N",
"CWE": "CWE-693",
"Href": "https://bdu.fstec.ru/vul/2024-02527",
"Impact": "Low",
"Public": "20240314"
},
{
"ID": "BDU:2024-02607",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-682",
"Href": "https://bdu.fstec.ru/vul/2024-02607",
"Impact": "Low",
"Public": "20240312"
}
],
"CVEs": [
{
"ID": "CVE-2023-22655",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22655",
"Impact": "None",
"Public": "20240314"
},
{
"ID": "CVE-2023-28746",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28746",
"Impact": "None",
"Public": "20240314"
},
{
"ID": "CVE-2023-38575",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38575",
"Impact": "None",
"Public": "20240314"
},
{
"ID": "CVE-2023-39368",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39368",
"Impact": "None",
"Public": "20240314"
},
{
"ID": "CVE-2023-43490",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-43490",
"Impact": "None",
"Public": "20240314"
},
{
"ID": "CVE-2023-45733",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45733",
"Impact": "None",
"Public": "20240516"
},
{
"ID": "CVE-2023-45745",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45745",
"Impact": "None",
"Public": "20240516"
},
{
"ID": "CVE-2023-46103",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46103",
"Impact": "None",
"Public": "20240516"
},
{
"ID": "CVE-2023-47855",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-47855",
"Impact": "None",
"Public": "20240516"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20248656001",
"Comment": "firmware-intel-ucode is earlier than 2:26-alt1.20240531"
}
]
}
]
}
}
]
}