CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
31.9%
Updated microcodes for Intel processors, fixing various functional issues, and at least the following security issues: Insufficient control flow management in some Intel® Processors may allow an authenticated user to potentially enable a denial of service via local access (CVE-2021-0127 / SA-00532). Improper initialization of shared resources in some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2021-0145 / SA-00561). Hardware allows activation of test or debug logic at runtime for some Intel® processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access (CVE-2021-0146 / SA-00528). Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom® Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access (CVE-2021-33120 / SA-00589) For info about the other fixes in this update, see the github reference.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | microcode | < 0.20220207-1 | microcode-0.20220207-1.mga8.nonfree |
bugs.mageia.org/show_bug.cgi?id=30037
github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
31.9%