Mageia 2024-0207: microcode Security Advisory Updates
Summary
The updated package fixes security vulnerabilities:
Hardware logic contains race conditions in some Intel(R) Processors may
allow an authenticated user to potentially enable partial information
disclosure via local access. (CVE-2023-45733)
Sequence of processor instructions leads to unexpected behavior in
Intel(R) Core(TM) Ultra Processors may allow an authenticated user to
potentially enable denial of service via local access. (CVE-2023-46103)
Improper input validation in some Intel(R) TDX module software before
version 1.5.05.46.698 may allow a privileged user to potentially enable
escalation of privilege via local access. (CVE-2023-45745)
References
- https://bugs.mageia.org/show_bug.cgi?id=33251
- https://ubuntu.com/security/notices/USN-6797-1
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745
Resolution
MGASA-2024-0207 - Updated microcode packages fix security vulnerabilities
SRPMS
- 9/nonfree/microcode-0.20240514-1.mga9.nonfree