[SUSE-SU-2023:3383-1] Security update for ucode-intel
Severity
Important
Affected Packages
7
CVEs
3
Security update for ucode-intel
This update for ucode-intel fixes the following issues:
- Updated to Intel CPU Microcode 20230808 release. (bsc#1214099)
- CVE-2022-40982: Fixed a potential security vulnerability in some Intel® Processors which may allow information disclosure.
- CVE-2023-23908: Fixed a potential security vulnerability in some 3rd Generation Intel® Xeon® Scalable processors which may allow information disclosure.
- CVE-2022-41804: Fixed a potential security vulnerability in some Intel® Xeon® Processors with Intel® Software Guard Extensions (SGX) which may allow escalation of privilege.
Package | Affected Version |
---|---|
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-15&sp=3 | < 20230808-150200.27.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-15&sp=2 | < 20230808-150200.27.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=slem-5 | < 20230808-150200.27.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-micro-5.4 | < 20230808-150200.27.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-micro-5.3 | < 20230808-150200.27.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-15.5 | < 20230808-150200.27.1 |
pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-15.4 | < 20230808-150200.27.1 |
- ID
- SUSE-SU-2023:3383-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20233383-1/
- Published
-
2023-08-23T07:26:47
(13 months ago) - Modified
-
2023-08-23T07:26:47
(13 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS2-2023-2195
- ALPINE:CVE-2022-40982
- ALPINE:CVE-2022-41804
- ALPINE:CVE-2023-23908
- ALSA-2023:7077
- DSA-5474-1
- DSA-5475-1
- ELSA-2023-12722
- ELSA-2023-12723
- ELSA-2023-12724
- ELSA-2023-12782
- ELSA-2023-12785
- ELSA-2023-12786
- ELSA-2023-12788
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7423
- FEDORA-2023-04473fc41e
- FEDORA-2023-10d34be85a
- FEDORA-2023-e1482687dd
- FEDORA-2023-fff31650c8
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7423
- RHSA-2023:7424
- SSA:2023-325-01
- SUSE-SU-2023:3289-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3359-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3382-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- USN-6286-1
- USN-6315-1
- USN-6316-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6388-1
- USN-6396-1
- USN-6396-2
- USN-6396-3
- USN-6397-1
- XSA-435
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3383-1.json | |
Suse | URL for SUSE-SU-2023:3383-1 | https://www.suse.com/support/update/announcement/2023/suse-su-20233383-1/ | |
Suse | E-Mail link for SUSE-SU-2023:3383-1 | https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html | |
Bugzilla | SUSE Bug 1206418 | https://bugzilla.suse.com/1206418 | |
Bugzilla | SUSE Bug 1214099 | https://bugzilla.suse.com/1214099 | |
CVE | SUSE CVE CVE-2022-40982 page | https://www.suse.com/security/cve/CVE-2022-40982/ | |
CVE | SUSE CVE CVE-2022-41804 page | https://www.suse.com/security/cve/CVE-2022-41804/ | |
CVE | SUSE CVE CVE-2023-23908 page | https://www.suse.com/security/cve/CVE-2023-23908/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-15&sp=3 | suse | ucode-intel | < 20230808-150200.27.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=sles-15&sp=2 | suse | ucode-intel | < 20230808-150200.27.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=slem-5 | suse | ucode-intel | < 20230808-150200.27.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-micro-5.4 | suse | ucode-intel | < 20230808-150200.27.1 | opensuse-leap-micro-5.4 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-micro-5.3 | suse | ucode-intel | < 20230808-150200.27.1 | opensuse-leap-micro-5.3 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-15.5 | suse | ucode-intel | < 20230808-150200.27.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/ucode-intel?arch=x86_64&distro=opensuse-leap-15.4 | suse | ucode-intel | < 20230808-150200.27.1 | opensuse-leap-15.4 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |