SB2024040830 - SUSE update for ucode-intel
Published: April 8, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Security features bypass (CVE-ID: CVE-2023-22655)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a protection mechanism failure in some 3rd and 4th Generation Intel Xeon Processors when using Intel SGX or Intel TDX. A local user can execute arbitrary code with elevated privileges.
2) Information disclosure (CVE-ID: CVE-2023-28746)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to information exposure through microarchitectural state after transient execution from some register files for some Intel Atom Processors. A local user can gain access to sensitive information.
3) Information disclosure (CVE-ID: CVE-2023-38575)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to non-transparent sharing of return predictor targets between contexts in some Intel Processors. A local user can gain unauthorized access to sensitive information on the system.
4) Protection Mechanism Failure (CVE-ID: CVE-2023-39368)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient implementation of security measures in the bus lock regulator mechanism. A remote attacker can trick the victim to open a specially crafted file and perform a denial of service (DoS) attack.
5) Information disclosure (CVE-ID: CVE-2023-43490)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to incorrect calculation in microcode keying mechanism for some Intel Xeon D Processors with Intel SGX. A local user can gain access to sensitive information.
Remediation
Install update from vendor's website.