• 公告ID (KylinSec-SA-2023-2240)

摘要:

microcode_ctl security update

安全等级: Medium

公告ID: KylinSec-SA-2023-2240

发布日期: 2024年10月31日

关联CVE: CVE-2022-33196   CVE-2022-38090   CVE-2022-40982  

  • 详细介绍

1. 漏洞描述

   

This is a tool to transform and deploy microcode update for x86 CPUs.

Security Fix(es):

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2022-33196)

Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.(CVE-2022-38090)

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.(CVE-2022-40982)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-33196 KY3.5.2 microcode_ctl Fixed
CVE-2022-38090 KY3.5.2 microcode_ctl Fixed
CVE-2022-40982 KY3.5.2 microcode_ctl Fixed

3. 影响组件

    microcode_ctl

4. 修复版本

   

KY3.5.2

软件名称 架构 版本号
microcode_ctl x86_64 2.1-42.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.2:

x86_64:

     microcode_ctl   

aarch64:

上一篇:KylinSec-SA-2023-2237 下一篇:KylinSec-SA-2023-2241