{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2013-5740","title":"Title"},{"category":"description","text":"Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2013-5740","url":"https://www.suse.com/security/cve/CVE-2013-5740"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 844228 for CVE-2013-5740","url":"https://bugzilla.suse.com/844228"}],"title":"SUSE CVE CVE-2013-5740","tracking":{"current_release_date":"2025-07-03T00:14:34Z","generator":{"date":"2023-02-15T05:34:55Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2013-5740","initial_release_date":"2023-02-15T05:34:55Z","revision_history":[{"date":"2023-02-15T05:34:55Z","number":"2","summary":"Current version"},{"date":"2025-03-16T12:37:40Z","number":"3","summary":"Current version"},{"date":"2025-04-25T12:10:57Z","number":"4","summary":"Current version"},{"date":"2025-06-25T15:00:58Z","number":"5","summary":"Current version"},{"date":"2025-07-03T00:14:34Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product":{"name":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_teradata:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4 LTSS","product":{"name":"SUSE Linux Enterprise Server 11 SP4 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss:11:sp4"}}},{"category":"product_version","name":"intel-SINIT","product":{"name":"intel-SINIT","product_id":"intel-SINIT","product_identification_helper":{"purl":"pkg:rpm/suse/intel-SINIT@?upstream=intel-SINIT.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"intel-SINIT as component of SUSE Linux Enterprise Server 11 SP3 for Teradata","product_id":"SUSE Linux Enterprise Server 11 SP3 for Teradata:intel-SINIT"},"product_reference":"intel-SINIT","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3 for Teradata"},{"category":"default_component_of","full_product_name":{"name":"intel-SINIT as component of SUSE Linux Enterprise Server 11 SP4 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS:intel-SINIT"},"product_reference":"intel-SINIT","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS"}]},"vulnerabilities":[{"cve":"CVE-2013-5740","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-5740"}],"notes":[{"category":"general","text":"Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.","title":"CVE description"}],"product_status":{"known_affected":["SUSE Linux Enterprise Server 11 SP3 for Teradata:intel-SINIT","SUSE Linux Enterprise Server 11 SP4 LTSS:intel-SINIT"]},"references":[{"category":"external","summary":"CVE-2013-5740","url":"https://www.suse.com/security/cve/CVE-2013-5740"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 844228 for CVE-2013-5740","url":"https://bugzilla.suse.com/844228"}],"threats":[{"category":"impact","date":"2013-09-12T21:15:29Z","details":"moderate"}],"title":"CVE-2013-5740"}]}