4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
19.8%
Updated microcodes for Intel processors, fixing various functional issues, and at least the following security issues: Sensitive information accessible by physical probing of JTAG interface for some Intel® Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access (CVE-2022-0005). Description: Improper access control for some Intel® Xeon® Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21131). Improper input validation for some Intel® Xeon® Processors may allow a privileged user to potentially enable denial of service via local access (CVE-2022-21136). Processor optimization removal or modification of security-critical code for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21151). For info about the other fixes in this update, see the github reference.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | microcode | < 0.20220510-1 | microcode-0.20220510-1.mga8.nonfree |
bugs.mageia.org/show_bug.cgi?id=30425
github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00614.html
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00616.html
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
19.8%