Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6797.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6797-1)
Summary:The remote host is missing an update for the 'intel-microcode' package(s) announced via the USN-6797-1 advisory.
Description:Summary:
The remote host is missing an update for the 'intel-microcode' package(s) announced via the USN-6797-1 advisory.

Vulnerability Insight:
It was discovered that some 3rd and 4th Generation Intel(r) Xeon(r) Processors
did not properly restrict access to certain hardware features when using
Intel(r) SGX or Intel(r) TDX. This may allow a privileged local user to
potentially further escalate their privileges on the system. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-22655)

It was discovered that some Intel(r) Atom(r) Processors did not properly clear
register state when performing various operations. A local attacker could
use this to obtain sensitive information via a transient execution attack.
This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746)

It was discovered that some Intel(r) Processors did not properly clear the
state of various hardware structures when switching execution contexts. A
local attacker could use this to access privileged information. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-38575)

It was discovered that some Intel(r) Processors did not properly enforce bus
lock regulator protections. A remote attacker could use this to cause a
denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368)

It was discovered that some Intel(r) Xeon(r) D Processors did not properly
calculate the SGX base key when using Intel(r) SGX. A privileged local
attacker could use this to obtain sensitive information. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-43490)

It was discovered that some Intel(r) Processors did not properly protect against
concurrent accesses. A local attacker could use this to obtain sensitive
information. (CVE-2023-45733)

It was discovered that some Intel(r) Processors TDX module software did not
properly validate input. A privileged local attacker could use this information
to potentially further escalate their privileges on the system.
(CVE-2023-45745, CVE-2023-47855)

It was discovered that some Intel(r) Core(tm) Ultra processors did not properly
handle particular instruction sequences. A local attacker could use this
issue to cause a denial of service. (CVE-2023-46103)

Affected Software/OS:
'intel-microcode' package(s) on Ubuntu 16.04, Ubuntu 18.04, Ubuntu 20.04, Ubuntu 22.04, Ubuntu 23.10, Ubuntu 24.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-22655
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-28746
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
http://www.openwall.com/lists/oss-security/2024/03/12/13
Common Vulnerability Exposure (CVE) ID: CVE-2023-38575
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-39368
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-43490
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-45733
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-45745
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-46103
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-47855
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.