Updated microcode packages fix security vulnerabilities
Publication date: 03 Jun 2024Modification date: 03 Jun 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-45733 , CVE-2023-46103 , CVE-2023-45745
Description
The updated package fixes security vulnerabilities: Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access. (CVE-2023-45733) Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2023-46103) Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2023-45745)
References
- https://bugs.mageia.org/show_bug.cgi?id=33251
- https://ubuntu.com/security/notices/USN-6797-1
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745
SRPMS
9/nonfree
- microcode-0.20240514-1.mga9.nonfree