摘要:
microcode_ctl security update
安全等级: High
公告ID: KylinSec-SA-2025-1638
发布日期: 2025年3月18日
关联CVE: CVE-2023-34440 CVE-2023-43758 CVE-2024-24582 CVE-2024-28047 CVE-2024-28127 CVE-2024-29214 CVE-2024-31068 CVE-2024-31157 CVE-2024-36293 CVE-2024-37020 CVE-2024-39279 CVE-2024-39355
This is a tool to transform and deploy microcode update for x86 CPUs.
Security Fix(es):
Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-34440)
Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-43758)
Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.(CVE-2024-24582)
Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.(CVE-2024-28047)
Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-28127)
Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-29214)
Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of service via local access.(CVE-2024-31068)
Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.(CVE-2024-31157)
Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.(CVE-2024-36293)
Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2024-37020)
Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.(CVE-2024-39279)
Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.(CVE-2024-39355)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-34440 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2023-34440 | V6 | microcode_ctl | Fixed |
CVE-2023-43758 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2023-43758 | V6 | microcode_ctl | Fixed |
CVE-2024-24582 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-24582 | V6 | microcode_ctl | Fixed |
CVE-2024-28047 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-28047 | V6 | microcode_ctl | Fixed |
CVE-2024-28127 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-28127 | V6 | microcode_ctl | Fixed |
CVE-2024-29214 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-29214 | V6 | microcode_ctl | Fixed |
CVE-2024-31068 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-31068 | V6 | microcode_ctl | Fixed |
CVE-2024-31157 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-31157 | V6 | microcode_ctl | Fixed |
CVE-2024-36293 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-36293 | V6 | microcode_ctl | Fixed |
CVE-2024-37020 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-37020 | V6 | microcode_ctl | Fixed |
CVE-2024-39279 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-39279 | V6 | microcode_ctl | Fixed |
CVE-2024-39355 | KY3.4-5A | microcode_ctl | Fixed |
CVE-2024-39355 | V6 | microcode_ctl | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
microcode_ctl | x86_64 | 20250211-1.kb1.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
microcode_ctl | x86_64 | 20250211-1.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名