MGASA-2022-0064

Source
https://advisories.mageia.org/MGASA-2022-0064.html
Import Source
https://advisories.mageia.org/MGASA-2022-0064.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0064
Related
Published
2022-02-15T20:50:31Z
Modified
2022-02-17T18:21:47Z
Summary
Updated microcode packages fix security vulnerabilities
Details

Updated microcodes for Intel processors, fixing various functional issues, and at least the following security issues:

Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access (CVE-2021-0127 / SA-00532).

Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2021-0145 / SA-00561).

Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access (CVE-2021-0146 / SA-00528).

Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access (CVE-2021-33120 / SA-00589)

For info about the other fixes in this update, see the github reference.

References
Credits

Affected packages

Mageia:8 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20220207-1.mga8.nonfree

Ecosystem specific

{
    "section": "nonfree"
}