Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-1018 (GCVE-0-2023-1018)
Vulnerability from cvelistv5 – Published: 2023-02-28 17:54 – Updated: 2025-11-04 19:14| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Trusted Computing Group | TPM2.0 |
Affected:
1.59
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:14:39.612Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "TCG TPM2.0 Errata Version 1.4",
"tags": [
"x_transferred"
],
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
},
{
"name": "TCG Security Advisories",
"tags": [
"x_transferred"
],
"url": "https://trustedcomputinggroup.org/about/security/"
},
{
"name": "CERT/CC Advisory VU#782720",
"tags": [
"x_transferred"
],
"url": "https://kb.cert.org/vuls/id/782720"
},
{
"url": "https://www.kb.cert.org/vuls/id/782720"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-1018",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-07T18:38:17.368376Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-07T18:38:47.809Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "TPM2.0",
"vendor": "Trusted Computing Group",
"versions": [
{
"status": "affected",
"version": "1.59"
}
]
},
{
"product": "TPM2.0",
"vendor": "Trusted Computing Group",
"versions": [
{
"status": "affected",
"version": "1.38"
}
]
},
{
"product": "TPM2.0",
"vendor": "Trusted Computing Group",
"versions": [
{
"status": "affected",
"version": "1.16"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Francisco Falcon of Quarkslab"
}
],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-125 Out-of-bounds Read",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-28T19:08:19.512Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "TCG TPM2.0 Errata Version 1.4 ",
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
},
{
"name": "TCG Security Advisories",
"url": "https://trustedcomputinggroup.org/about/security/"
},
{
"name": "CERT/CC Advisory VU#782720",
"url": "https://kb.cert.org/vuls/id/782720"
}
],
"source": {
"discovery": "external"
},
"title": "TPM2.0 vulnerable to out-of-bounds read ",
"x_generator": {
"engine": "VINCE 2.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1018"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-1018",
"datePublished": "2023-02-28T17:54:33.260Z",
"dateReserved": "2023-02-24T16:06:48.994Z",
"dateUpdated": "2025-11-04T19:14:39.612Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf\", \"name\": \"TCG TPM2.0 Errata Version 1.4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://trustedcomputinggroup.org/about/security/\", \"name\": \"TCG Security Advisories\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://kb.cert.org/vuls/id/782720\", \"name\": \"CERT/CC Advisory VU#782720\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/782720\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T19:14:39.612Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-1018\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-07T18:38:17.368376Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-07T18:38:42.408Z\"}}], \"cna\": {\"title\": \"TPM2.0 vulnerable to out-of-bounds read \", \"source\": {\"discovery\": \"external\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Francisco Falcon of Quarkslab\"}], \"affected\": [{\"vendor\": \"Trusted Computing Group\", \"product\": \"TPM2.0\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.59\"}]}, {\"vendor\": \"Trusted Computing Group\", \"product\": \"TPM2.0\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.38\"}]}, {\"vendor\": \"Trusted Computing Group\", \"product\": \"TPM2.0\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.16\"}]}], \"references\": [{\"url\": \"https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf\", \"name\": \"TCG TPM2.0 Errata Version 1.4 \"}, {\"url\": \"https://trustedcomputinggroup.org/about/security/\", \"name\": \"TCG Security Advisories\"}, {\"url\": \"https://kb.cert.org/vuls/id/782720\", \"name\": \"CERT/CC Advisory VU#782720\"}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 2.0.6\", \"origin\": \"https://cveawg.mitre.org/api/cve/CVE-2023-1018\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"shortName\": \"certcc\", \"dateUpdated\": \"2023-02-28T19:08:19.512Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-1018\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T19:14:39.612Z\", \"dateReserved\": \"2023-02-24T16:06:48.994Z\", \"assignerOrgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"datePublished\": \"2023-02-28T17:54:33.260Z\", \"assignerShortName\": \"certcc\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CVE-2023-1018
Vulnerability from osv_almalinux
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
- ntfs-3g: heap-based buffer overflow in ntfsck (CVE-2021-46790)
- QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion (CVE-2022-3165)
- ntfs-3g: crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value (CVE-2022-30784)
- ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate (CVE-2022-30786)
- ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc (CVE-2022-30788)
- ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array (CVE-2022-30789)
- tpm2: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1018)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "SLOF"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "20210217-1.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "hivex-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "hivex-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-appliance"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-bash-completion"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-gfs2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-gobject"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-gobject-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-inspect-icons"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-java"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-java-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-javadoc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-man-pages-ja"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-man-pages-uk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-rescue"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-rsync"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-tools"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-tools-c"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-winsupport"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.8-1.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libguestfs-xfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libiscsi-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-8.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd-bash-completion"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libtpms"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.1-2.20211126git1ff6fe1f43.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libtpms-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.1-2.20211126git1ff6fe1f43.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-config-network"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-config-nwfilter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-interface"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-network"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-nodedev"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-nwfilter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-qemu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-secret"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-disk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-gluster"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-iscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-iscsi-direct"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-logical"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-mpath"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-rbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-driver-storage-scsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-daemon-kvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-dbus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.0-2.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-dbus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.0-2.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-lock-sanlock"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-nss"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libvirt-wireshark"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-19.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "lua-guestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdfuse"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdfuse"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-bash-completion"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-basic-filters"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-basic-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-curl-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-example-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-gzip-filter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-gzip-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-linuxdisk-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-nbd-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-python-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-ssh-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-tar-filter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-tar-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-tmpdisk-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-vddk-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nbdkit-xz-filter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.0-5.module_el8.8.0+3485+7cffc4a3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netcf-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.8-12.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-hivex-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-hivex-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libguestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libguestfs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ocaml-libnbd-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Sys-Guestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Sys-Virt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-1.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-Sys-Virt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-1.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perl-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libguestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libnbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0-5.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-libvirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.0-2.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-guest-agent"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-img"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-block-curl"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-block-gluster"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-block-iscsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-block-rbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-block-ssh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-docs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-hw-usbredir"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-ui-opengl"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "qemu-kvm-ui-spice"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "15:6.2.0-32.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ruby-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ruby-hivex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.18-23.module_el8.6.0+3161+a07c0ea5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "ruby-libguestfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "seabios"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.0-3.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "seabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.0-3.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "seavgabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.0-3.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "sgabios"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.20170427git-3.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "sgabios-bin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:0.20170427git-3.module_el8.6.0+2880+7d9e3703"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "supermin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.2.1-2.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "supermin-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.2.1-2.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "swtpm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0-4.20211109gitb79fd91.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "swtpm-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0-4.20211109gitb79fd91.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "swtpm-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0-4.20211109gitb79fd91.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "swtpm-tools"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0-4.20211109gitb79fd91.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "swtpm-tools-pkcs11"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0-4.20211109gitb79fd91.module_el8.7.0+3346+68867adb"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "virt-dib"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.44.0-9.module_el8.7.0+3493+5ed0bd1c.alma"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "virt-v2v"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.42.0-22.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "virt-v2v-bash-completion"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.42.0-22.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "virt-v2v-man-pages-ja"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.42.0-22.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "virt-v2v-man-pages-uk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.42.0-22.module_el8.8.0+3553+bd08596b"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.\n\nSecurity Fix(es):\n\n* ntfs-3g: heap-based buffer overflow in ntfsck (CVE-2021-46790)\n* QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion (CVE-2022-3165)\n* ntfs-3g: crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value (CVE-2022-30784)\n* ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate (CVE-2022-30786)\n* ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc (CVE-2022-30788)\n* ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array (CVE-2022-30789)\n* tpm2: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1018)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2023:2757",
"modified": "2023-05-22T07:58:34Z",
"published": "2023-05-16T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:2757"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2021-46790"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-30784"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-30786"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-30788"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-30789"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-3165"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-1018"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2093314"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2093326"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2093340"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2093348"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2093358"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2129739"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2149420"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2023-2757.html"
}
],
"related": [
"CVE-2021-46790",
"CVE-2022-3165",
"CVE-2022-30784",
"CVE-2022-30786",
"CVE-2022-30788",
"CVE-2022-30789",
"CVE-2023-1018"
],
"summary": "Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update"
}
CVE-2023-1018
Vulnerability from osv_almalinux
The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines.
Security Fix(es):
- tpm: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1017)
- tpm2: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1018)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libtpms"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.1-3.20211126git1ff6fe1f43.el9_2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines.\n\nSecurity Fix(es):\n\n* tpm: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1017)\n* tpm2: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1018)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2023:2453",
"modified": "2023-05-12T04:02:14Z",
"published": "2023-05-09T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:2453"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-1017"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-1018"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2149416"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2149420"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2023-2453.html"
}
],
"related": [
"CVE-2023-1017",
"CVE-2023-1018"
],
"summary": "Moderate: libtpms security update"
}
CERTFR-2023-AVI-0232
Vulnerability from certfr_avis - Published: 2023-03-15 - Updated: 2023-03-15
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, un déni de service, un contournement de la fonctionnalité de sécurité et une exécution de code à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24859"
},
{
"name": "CVE-2023-24865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24865"
},
{
"name": "CVE-2023-24870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24870"
},
{
"name": "CVE-2023-23410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23410"
},
{
"name": "CVE-2023-23415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23415"
},
{
"name": "CVE-2023-23417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23417"
},
{
"name": "CVE-2023-24913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24913"
},
{
"name": "CVE-2023-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24858"
},
{
"name": "CVE-2023-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1018"
},
{
"name": "CVE-2023-23407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23407"
},
{
"name": "CVE-2023-24906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24906"
},
{
"name": "CVE-2023-24907",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24907"
},
{
"name": "CVE-2023-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23419"
},
{
"name": "CVE-2023-23421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23421"
},
{
"name": "CVE-2023-23393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23393"
},
{
"name": "CVE-2023-23404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23404"
},
{
"name": "CVE-2023-23422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23422"
},
{
"name": "CVE-2023-24868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24868"
},
{
"name": "CVE-2023-24862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24862"
},
{
"name": "CVE-2023-24856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24856"
},
{
"name": "CVE-2023-23405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23405"
},
{
"name": "CVE-2023-24872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24872"
},
{
"name": "CVE-2023-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23388"
},
{
"name": "CVE-2023-23411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23411"
},
{
"name": "CVE-2023-24866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24866"
},
{
"name": "CVE-2023-24871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24871"
},
{
"name": "CVE-2023-24911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24911"
},
{
"name": "CVE-2023-23400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23400"
},
{
"name": "CVE-2023-24863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24863"
},
{
"name": "CVE-2023-23402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23402"
},
{
"name": "CVE-2023-24880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24880"
},
{
"name": "CVE-2023-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24857"
},
{
"name": "CVE-2023-24861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24861"
},
{
"name": "CVE-2023-24908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24908"
},
{
"name": "CVE-2023-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1017"
},
{
"name": "CVE-2023-23420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23420"
},
{
"name": "CVE-2023-23418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23418"
},
{
"name": "CVE-2023-23412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23412"
},
{
"name": "CVE-2023-23385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23385"
},
{
"name": "CVE-2023-23414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23414"
},
{
"name": "CVE-2023-23423",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23423"
},
{
"name": "CVE-2023-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21708"
},
{
"name": "CVE-2023-24867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24867"
},
{
"name": "CVE-2023-24910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24910"
},
{
"name": "CVE-2023-23416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23416"
},
{
"name": "CVE-2023-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23403"
},
{
"name": "CVE-2023-23392",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23392"
},
{
"name": "CVE-2023-23401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23401"
},
{
"name": "CVE-2023-23409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23409"
},
{
"name": "CVE-2023-23413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23413"
},
{
"name": "CVE-2023-24876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24876"
},
{
"name": "CVE-2023-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24864"
},
{
"name": "CVE-2023-23406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23406"
},
{
"name": "CVE-2023-24909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24909"
},
{
"name": "CVE-2023-24869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24869"
},
{
"name": "CVE-2023-23394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23394"
}
],
"initial_release_date": "2023-03-15T00:00:00",
"last_revision_date": "2023-03-15T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23410 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23410"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24865 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24865"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23407 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23407"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23403 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23403"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23393 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23393"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23413 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23413"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23394 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23394"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24910 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-21708 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23421 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23421"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23412 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23412"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24859 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24859"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24866 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24866"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24868 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24868"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24864 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24864"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23416 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23416"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23401 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23401"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24856 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24880 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24863 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24863"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24911 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24911"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23385 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23385"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24872 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24872"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24862 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24862"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23392 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23392"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23388 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23388"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23400 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23400"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24857 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24857"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23405 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23405"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23423 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23423"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23417 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23417"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24909 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24909"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23419 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23419"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24869 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24869"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23420 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23411 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23411"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24907 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24907"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24913 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24913"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23414 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23414"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24908 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24908"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23402 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23402"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23409 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23409"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23418 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23418"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24870 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24870"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23415 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23406 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23406"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-1018 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1018"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23422 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23422"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24858 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24858"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24861 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24861"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-23404 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23404"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24867 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24867"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-1017 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1017"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24876 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24876"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24871 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24871"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-24906 du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24906"
}
],
"reference": "CERTFR-2023-AVI-0232",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de service, un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9 et une ex\u00e9cution de code \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 mars 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
GHSA-CR8W-XXQW-FM2M
Vulnerability from github – Published: 2023-02-28 18:30 – Updated: 2023-02-28 18:30An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.
{
"affected": [],
"aliases": [
"CVE-2023-1018"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-28T18:15:00Z",
"severity": null
},
"details": "An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.",
"id": "GHSA-cr8w-xxqw-fm2m",
"modified": "2023-02-28T18:30:17Z",
"published": "2023-02-28T18:30:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1018"
},
{
"type": "WEB",
"url": "https://kb.cert.org/vuls/id/782720"
},
{
"type": "WEB",
"url": "https://trustedcomputinggroup.org/about/security"
},
{
"type": "WEB",
"url": "https://trustedcomputinggroup.org/resource/errata-for-tpm-library-specification-2-0"
},
{
"type": "WEB",
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
}
],
"schema_version": "1.4.0",
"severity": []
}
CVE-2023-1018
Vulnerability from fstec - Published: 28.02.2023{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO175, TO176, TO177, TO178, TO179, TO180, TO184, TO185, TO401, TO532",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO175 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 20H2 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023696), TO176 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 22H2 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023696), TO177 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 21H2 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023696), TO178 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 1809 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023702), TO179 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 11 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023698), TO180 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023702), TO184 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2016 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023697), TO185 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2022 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 x64, 2023 03 (KB5023705), TO401 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 7.0U3l-21424296 \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u0430 VMware ESXi 7.0, TO532 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 8.0U1-21495797 \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u0430 VMware ESXi 8.0",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "VMware Inc., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Novell Inc., Red Hat Inc., Trusted Computing Group, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.0.0 (VMware ESXi), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 8 Advanced Virtualization (Red Hat Enterprise Linux), 15 SP4 (Suse Linux Enterprise Server), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 9 (Red Hat Enterprise Linux), 15 SP3-LTSS (Suse Linux Enterprise Server), 15 SP3-BCL (Suse Linux Enterprise Server), 1.59 (Trusted Platform Module), 1.38 (Trusted Platform Module), 1.16 (Trusted Platform Module), 8.0 (VMware ESXi), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Trusted Platform Module (TPM):\n\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2023-1018\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2023-1018.html\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u041b\u042c\u0422 \u0421\u041f 10: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "28.02.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.12.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.03.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-01029",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-1018",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "VMware ESXi, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Suse Linux Enterprise Server, SUSE Linux Enterprise Server for SAP Applications, Red Hat Enterprise Linux, Trusted Platform Module, \u0410\u041b\u042c\u0422 \u0421\u041f 10",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Novell Inc. Suse Linux Enterprise Server 15 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3 , Red Hat Inc. Red Hat Enterprise Linux 8 Advanced Virtualization , Novell Inc. Suse Linux Enterprise Server 15 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4 , Red Hat Inc. Red Hat Enterprise Linux 9 , Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS , Novell Inc. Suse Linux Enterprise Server 15 SP3-BCL , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 CryptParameterDecryption \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 Trusted Platform Module (TPM), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 CryptParameterDecryption \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 Trusted Platform Module (TPM) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://kb.cert.org/vuls/id/782720\nhttps://trustedcomputinggroup.org/about/security/\nhttps://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf\nhttps://access.redhat.com/security/cve/cve-2023-1018\nhttps://www.suse.com/security/cve/CVE-2023-1018.html\nhttps://redos.red-soft.ru/support/secure/\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
GSD-2023-1018
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-1018",
"id": "GSD-2023-1018",
"references": [
"https://www.suse.com/security/cve/CVE-2023-1018.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-1018"
],
"details": "An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.",
"id": "GSD-2023-1018",
"modified": "2023-12-13T01:20:41.647687Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2023-1018",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TPM2.0",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.59"
},
{
"version_affected": "=",
"version_value": "1.38"
},
{
"version_affected": "=",
"version_value": "1.16"
}
]
}
}
]
},
"vendor_name": "Trusted Computing Group"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Francisco Falcon of Quarkslab"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM."
}
]
},
"generator": {
"engine": "VINCE 2.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1018"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125 Out-of-bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf",
"refsource": "MISC",
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
},
{
"name": "https://trustedcomputinggroup.org/about/security/",
"refsource": "MISC",
"url": "https://trustedcomputinggroup.org/about/security/"
},
{
"name": "https://kb.cert.org/vuls/id/782720",
"refsource": "MISC",
"url": "https://kb.cert.org/vuls/id/782720"
}
]
},
"source": {
"discovery": "external"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trustedcomputinggroup:trusted_platform_module:2.0:revision_1.16:*:*:*:*:*:*",
"matchCriteriaId": "AC453113-CAE8-44B0-8306-7BB854B77EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trustedcomputinggroup:trusted_platform_module:2.0:revision_1.38:*:*:*:*:*:*",
"matchCriteriaId": "6F43ED59-0C7E-4BBB-8931-4033AEC36269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trustedcomputinggroup:trusted_platform_module:2.0:revision_1.59:*:*:*:*:*:*",
"matchCriteriaId": "2FC8BA48-73AA-483B-9276-A0605B15F22F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "3FE6559F-B4C0-4188-86CB-4DB6FBB85A5C",
"versionEndExcluding": "10.0.10240.19805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "93CEF0C6-6B6E-4157-A763-89F570FE0AB7",
"versionEndExcluding": "10.0.14393.5786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "3001E324-7A3C-4EEB-86DC-E79471F752BD",
"versionEndExcluding": "10.0.17763.4131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "579AE0F1-E226-4504-9BF8-05E7BAE682D7",
"versionEndExcluding": "10.0.19042.2728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "D41F5E5B-D344-41B1-A160-8118DDB623C3",
"versionEndExcluding": "10.0.19044.2728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "BA59AB71-F8C7-49B0-AD2F-F9C00D82C85A",
"versionEndExcluding": "10.0.19045.2728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "6D06089A-31F7-44C7-98CB-216ABAD280A4",
"versionEndExcluding": "10.0.22000.1696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "7BB45E5C-C74C-46B1-BE64-4EF90075A3CC",
"versionEndExcluding": "10.0.22621.1413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40EFB742-9414-4585-A71E-4316D488BFA7",
"versionEndExcluding": "10.0.14393.5786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D19233CA-3830-499D-A4C0-2C023C8AD700",
"versionEndExcluding": "10.0.17763.4131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA73D25B-EB4C-4493-9C79-4F4E181FF95B",
"versionEndExcluding": "10.0.20348.1607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM."
}
],
"id": "CVE-2023-1018",
"lastModified": "2024-04-01T15:50:11.033",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-28T18:15:10.290",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://kb.cert.org/vuls/id/782720"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "https://trustedcomputinggroup.org/about/security/"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
FKIE_CVE-2023-1018
Vulnerability from fkie_nvd - Published: 2023-02-28 18:15 - Updated: 2025-11-04 20:165.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | https://kb.cert.org/vuls/id/782720 | Third Party Advisory, US Government Resource | |
| cret@cert.org | https://trustedcomputinggroup.org/about/security/ | Vendor Advisory | |
| cret@cert.org | https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.cert.org/vuls/id/782720 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://trustedcomputinggroup.org/about/security/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/782720 |
| Vendor | Product | Version | |
|---|---|---|---|
| trustedcomputinggroup | trusted_platform_module | 2.0 | |
| trustedcomputinggroup | trusted_platform_module | 2.0 | |
| trustedcomputinggroup | trusted_platform_module | 2.0 | |
| microsoft | windows_10_1507 | * | |
| microsoft | windows_10_1607 | * | |
| microsoft | windows_10_1809 | * | |
| microsoft | windows_10_20h2 | * | |
| microsoft | windows_10_21h2 | * | |
| microsoft | windows_10_22h2 | * | |
| microsoft | windows_11_21h2 | * | |
| microsoft | windows_11_22h2 | * | |
| microsoft | windows_server_2016 | * | |
| microsoft | windows_server_2019 | * | |
| microsoft | windows_server_2022 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trustedcomputinggroup:trusted_platform_module:2.0:revision_1.16:*:*:*:*:*:*",
"matchCriteriaId": "AC453113-CAE8-44B0-8306-7BB854B77EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trustedcomputinggroup:trusted_platform_module:2.0:revision_1.38:*:*:*:*:*:*",
"matchCriteriaId": "6F43ED59-0C7E-4BBB-8931-4033AEC36269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trustedcomputinggroup:trusted_platform_module:2.0:revision_1.59:*:*:*:*:*:*",
"matchCriteriaId": "2FC8BA48-73AA-483B-9276-A0605B15F22F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "3FE6559F-B4C0-4188-86CB-4DB6FBB85A5C",
"versionEndExcluding": "10.0.10240.19805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "93CEF0C6-6B6E-4157-A763-89F570FE0AB7",
"versionEndExcluding": "10.0.14393.5786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "3001E324-7A3C-4EEB-86DC-E79471F752BD",
"versionEndExcluding": "10.0.17763.4131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "579AE0F1-E226-4504-9BF8-05E7BAE682D7",
"versionEndExcluding": "10.0.19042.2728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "D41F5E5B-D344-41B1-A160-8118DDB623C3",
"versionEndExcluding": "10.0.19044.2728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "BA59AB71-F8C7-49B0-AD2F-F9C00D82C85A",
"versionEndExcluding": "10.0.19045.2728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "6D06089A-31F7-44C7-98CB-216ABAD280A4",
"versionEndExcluding": "10.0.22000.1696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "7BB45E5C-C74C-46B1-BE64-4EF90075A3CC",
"versionEndExcluding": "10.0.22621.1413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40EFB742-9414-4585-A71E-4316D488BFA7",
"versionEndExcluding": "10.0.14393.5786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D19233CA-3830-499D-A4C0-2C023C8AD700",
"versionEndExcluding": "10.0.17763.4131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA73D25B-EB4C-4493-9C79-4F4E181FF95B",
"versionEndExcluding": "10.0.20348.1607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read vulnerability exists in TPM2.0\u0027s Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM."
}
],
"id": "CVE-2023-1018",
"lastModified": "2025-11-04T20:16:16.827",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-02-28T18:15:10.290",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://kb.cert.org/vuls/id/782720"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "https://trustedcomputinggroup.org/about/security/"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://kb.cert.org/vuls/id/782720"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://trustedcomputinggroup.org/about/security/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/782720"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.