摘要:
microcode_ctl security update
安全等级: High
公告ID: KylinSec-SA-2024-4786
发布日期: 2025年2月17日
关联CVE: CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490 CVE-2023-45733 CVE-2023-45745 CVE-2023-46103 CVE-2023-47855
This is a tool to transform and deploy microcode update for x86 CPUs.
Security Fix(es):
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-22655)
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.(CVE-2023-28746)
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.(CVE-2023-38575)
Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.(CVE-2023-39368)
Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.(CVE-2023-43490)
Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.(CVE-2023-45733)
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-45745)
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2023-46103)
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-47855)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-22655 | V6 | microcode_ctl | Fixed |
CVE-2023-28746 | V6 | microcode_ctl | Fixed |
CVE-2023-38575 | V6 | microcode_ctl | Fixed |
CVE-2023-39368 | V6 | microcode_ctl | Fixed |
CVE-2023-43490 | V6 | microcode_ctl | Fixed |
CVE-2023-45733 | V6 | microcode_ctl | Fixed |
CVE-2023-45745 | V6 | microcode_ctl | Fixed |
CVE-2023-46103 | V6 | microcode_ctl | Fixed |
CVE-2023-47855 | V6 | microcode_ctl | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
microcode_ctl | x86_64 | 20240910-1.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名