Amazon Linux 2 Security Advisory: ALAS-2024-2682
Advisory Release Date: 2024-10-24 23:54 Pacific
Advisory Updated Date: 2024-12-05 01:02 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-12-05: CVE-2024-21853 was added to this advisory.
2024-12-05: CVE-2024-21820 was added to this advisory.
2024-12-05: CVE-2024-23918 was added to this advisory.
Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-21820)
Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access. (CVE-2024-21853)
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-23918)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910
DEBIANBUG: [1081363] (CVE-2024-23984)
Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24853)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910
DEBIANBUG: [1081363] (CVE-2024-24968)
Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24980)
Affected Packages:
microcode_ctl
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update microcode_ctl to update your system.
System reboot is required in order to complete this update.
i686:
microcode_ctl-2.1-47.amzn2.4.22.i686
microcode_ctl-debuginfo-2.1-47.amzn2.4.22.i686
src:
microcode_ctl-2.1-47.amzn2.4.22.src
x86_64:
microcode_ctl-2.1-47.amzn2.4.22.x86_64
microcode_ctl-debuginfo-2.1-47.amzn2.4.22.x86_64