MGASA-2022-0193

Source
https://advisories.mageia.org/MGASA-2022-0193.html
Import Source
https://advisories.mageia.org/MGASA-2022-0193.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0193
Related
Published
2022-05-21T08:50:18Z
Modified
2022-05-21T07:59:11Z
Summary
Updated microcode packages fix security vulnerabilities
Details

Updated microcodes for Intel processors, fixing various functional issues, and at least the following security issues:

Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access (CVE-2022-0005).

Description: Improper access control for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21131).

Improper input validation for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable denial of service via local access (CVE-2022-21136).

Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21151).

For info about the other fixes in this update, see the github reference.

References
Credits

Affected packages

Mageia:8 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20220510-1.mga8.nonfree

Ecosystem specific

{
    "section": "nonfree"
}