• 公告ID (KylinSec-SA-2024-3536)

摘要:

microcode_ctl security update

安全等级: High

公告ID: KylinSec-SA-2024-3536

发布日期: 2024年6月14日

关联CVE: CVE-2023-45733   CVE-2023-45745   CVE-2023-46103   CVE-2023-47855  

  • 详细介绍

1. 漏洞描述

   

This is a tool to transform and deploy microcode update for x86 CPUs.

Security Fix(es):

Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.(CVE-2023-45733)

Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-45745)

Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2023-46103)

Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-47855)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-45733 KY3.4-5A microcode_ctl Fixed
CVE-2023-45745 KY3.4-5A microcode_ctl Fixed
CVE-2023-46103 KY3.4-5A microcode_ctl Fixed
CVE-2023-47855 KY3.4-5A microcode_ctl Fixed

3. 影响组件

    microcode_ctl

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
microcode_ctl x86_64 20240813-1.kb1.ky3_4

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     microcode_ctl   

aarch64:

上一篇:KylinSec-SA-2024-3535 下一篇:KylinSec-SA-2024-3537