Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-23583

Опубликовано: 14 нояб. 2023
Источник: debian
EPSS Низкий

Описание

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
intel-microcodefixed3.20231114.1package

Примечания

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html

  • https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114

  • https://lock.cmpxchg8b.com/reptar.html

  • https://github.com/google/security-research/tree/master/pocs/cpus/reptar

  • https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/redundant-prefix-issue.html

EPSS

Процентиль: 9%
0.00035
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

CVSS3: 8.8
redhat
больше 1 года назад

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

CVSS3: 8.8
nvd
больше 1 года назад

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

suse-cvrf
больше 1 года назад

Security update for ucode-intel

suse-cvrf
больше 1 года назад

Security update for ucode-intel

EPSS

Процентиль: 9%
0.00035
Низкий