摘要:
microcode_ctl security update
安全等级: Medium
公告ID: KylinSec-SA-2023-2240
发布日期: 2024年10月31日
This is a tool to transform and deploy microcode update for x86 CPUs.
Security Fix(es):
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2022-33196)
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.(CVE-2022-38090)
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.(CVE-2022-40982)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-33196 | KY3.5.2 | microcode_ctl | Fixed |
CVE-2022-38090 | KY3.5.2 | microcode_ctl | Fixed |
CVE-2022-40982 | KY3.5.2 | microcode_ctl | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
microcode_ctl | x86_64 | 2.1-42.ky3_5 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名