From 8b6f9bfc2b784a5192e6cd91e694f7c05f541544 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adrian=20Schr=C3=B6ter?= Date: Fri, 23 Aug 2024 09:04:07 +0200 Subject: [PATCH] Adding patchinfo patchinfo.20240719123321378528.269002615871826 --- .../_patchinfo | 53 +++++++++++++++++++ 1 file changed, 53 insertions(+) create mode 100644 patchinfo.20240719123321378528.269002615871826/_patchinfo diff --git a/patchinfo.20240719123321378528.269002615871826/_patchinfo b/patchinfo.20240719123321378528.269002615871826/_patchinfo new file mode 100644 index 0000000..d83d7f4 --- /dev/null +++ b/patchinfo.20240719123321378528.269002615871826/_patchinfo @@ -0,0 +1,53 @@ + + + VUL-0: CVE-2023-28746: ucode-intel: 20240312 release + VUL-0: ucode-intel: 20240514 release + + + + + + + + + + msmeissn + moderate + + security + Security update for ucode-intel + This update for ucode-intel fixes the following issues: + +- Intel CPU Microcode was updated to the 20240514 release (bsc#1224277) + - CVE-2023-45733: Security updates for INTEL-SA-01051 + - CVE-2023-46103: Security updates for INTEL-SA-01052 + - CVE-2023-45745,CVE-2023-47855: Security updates for INTEL-SA-01036 + +- Updated to Intel CPU Microcode 20240312 release. (bsc#1221323) + - Security updates for INTEL-SA-INTEL-SA-00972 + - CVE-2023-39368: Protection mechanism failure of bus lock regulator + for some Intel Processors may allow an unauthenticated user to + potentially enable denial of service via network access + - Security updates for INTEL-SA-INTEL-SA-00982 + - CVE-2023-38575: Non-transparent sharing of return predictor targets + between contexts in some Intel Processors may allow an authorized + user to potentially enable information disclosure via local access. + - Security updates for INTEL-SA-INTEL-SA-00898 + - CVE-2023-28746: Information exposure through microarchitectural + state after transient execution from some register files for some + Intel Atom Processors may allow an authenticated user to potentially + enable information disclosure via local access. + - Security updates for INTEL-SA-INTEL-SA-00960 + - CVE-2023-22655 Protection mechanism failure in some 3rd and 4th + Generation Intel Xeon Processors when using Intel SGX or Intel TDX + may allow a privileged user to potentially enable escalation of + privilege via local access. + - Security updates for INTEL-SA-INTEL-SA-01045 + - CVE-2023-43490: Incorrect calculation in microcode keying mechanism + for some Intel Xeon D Processors with Intel SGX may allow a + privileged user to potentially enable information disclosure via + local access. + + ucode-intel + +