MGASA-2022-0193 - Updated microcode packages fix security vulnerabilities Publication date: 21 May 2022 URL: https://advisories.mageia.org/MGASA-2022-0193.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-0005, CVE-2022-21131, CVE-2022-21136, CVE-2022-21151 Updated microcodes for Intel processors, fixing various functional issues, and at least the following security issues: Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access (CVE-2022-0005). may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21131). Improper input validation for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable denial of service via local access (CVE-2022-21136). Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2022-21151). For info about the other fixes in this update, see the github reference. References: - https://bugs.mageia.org/show_bug.cgi?id=30425 - https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00614.html - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00616.html - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0005 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21131 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21136 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151 SRPMS: - 8/nonfree/microcode-0.20220510-1.mga8.nonfree