Lucene search

K
mageiaGentoo FoundationMGASA-2024-0207
HistoryJun 03, 2024 - 9:30 p.m.

Updated microcode packages fix security vulnerabilities

2024-06-0321:30:48
Gentoo Foundation
advisories.mageia.org
5
microcode update
security vulnerabilities
intel processors
race conditions
unexpected behavior
input validation
tdx module

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

The updated package fixes security vulnerabilities: Hardware logic contains race conditions in some Intel® Processors may allow an authenticated user to potentially enable partial information disclosure via local access. (CVE-2023-45733) Sequence of processor instructions leads to unexpected behavior in Intel® Core™ Ultra Processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2023-46103) Improper input validation in some Intel® TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2023-45745)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchmicrocode< 0.20240514-1microcode-0.20240514-1.mga9.nonfree

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%