ALAS-2024-2682


Amazon Linux 2 Security Advisory: ALAS-2024-2682
Advisory Release Date: 2024-10-24 23:54 Pacific
Advisory Updated Date: 2024-12-05 01:02 Pacific
Severity: Important

Issue Overview:

2024-12-05: CVE-2024-21853 was added to this advisory.

2024-12-05: CVE-2024-21820 was added to this advisory.

2024-12-05: CVE-2024-23918 was added to this advisory.

Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-21820)

Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access. (CVE-2024-21853)

Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-23918)

NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910
DEBIANBUG: [1081363] (CVE-2024-23984)

Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24853)

NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910
DEBIANBUG: [1081363] (CVE-2024-24968)

Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24980)


Affected Packages:

microcode_ctl


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update microcode_ctl to update your system.
System reboot is required in order to complete this update.

New Packages:
i686:
    microcode_ctl-2.1-47.amzn2.4.22.i686
    microcode_ctl-debuginfo-2.1-47.amzn2.4.22.i686

src:
    microcode_ctl-2.1-47.amzn2.4.22.src

x86_64:
    microcode_ctl-2.1-47.amzn2.4.22.x86_64
    microcode_ctl-debuginfo-2.1-47.amzn2.4.22.x86_64