MGASA-2024-0207

Source
https://advisories.mageia.org/MGASA-2024-0207.html
Import Source
https://advisories.mageia.org/MGASA-2024-0207.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0207
Related
Published
2024-06-03T18:30:48Z
Modified
2024-06-03T17:35:43Z
Summary
Updated microcode packages fix security vulnerabilities
Details

The updated package fixes security vulnerabilities: Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access. (CVE-2023-45733) Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2023-46103) Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2023-45745)

References
Credits

Affected packages

Mageia:9 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20240514-1.mga9.nonfree

Ecosystem specific

{
    "section": "nonfree"
}