Download
| Alert*
oval:org.secpod.oval:def:89048294
This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20230214 release. Security issues fixed: - CVE-2022-38090: Security updates for [INTEL-SA-00767] - CVE-2022-33196: Security updates for [INTEL-SA-00738] - CVE-2022-21216: Security updates for [INTEL-SA-00700] - ... oval:org.secpod.oval:def:89048293 This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20230214 release. Security issues fixed: - CVE-2022-38090: Security updates for [INTEL-SA-00767] - CVE-2022-33196: Security updates for [INTEL-SA-00738] - CVE-2022-21216: Security updates for [INTEL-SA-00700] - ... oval:org.secpod.oval:def:707970 intel-microcode: Processor microcode for Intel CPUs Several security issues were fixed in Intel Microcode. oval:org.secpod.oval:def:125745 The microcode_ctl utility is a companion to the microcode driver written by Tigran Aivazian tigranaivazian.fsnet.co.uk. The microcode update is volatile and needs to be uploaded on each system boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts back to the old microcode. oval:org.secpod.oval:def:89048603 This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20230214 release. Security issues fixed: * CVE-2022-38090: Security updates for INTEL-SA-00767 * CVE-2022-33196: Security updates for INTEL-SA-00738 * CVE-2022-21216: Security updates for INTEL-SA-00700 * New P ... oval:org.secpod.oval:def:1701329 Insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. Incorrect calculation in microcode keying mechanism for some 3rd Generatio ... oval:org.secpod.oval:def:125772 The microcode_ctl utility is a companion to the microcode driver written by Tigran Aivazian tigranaivazian.fsnet.co.uk. The microcode update is volatile and needs to be uploaded on each system boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts back to the old microcode. oval:org.secpod.oval:def:89468 intel-microcode: Processor microcode for Intel CPUs Several security issues were fixed in Intel Microcode. oval:org.secpod.oval:def:89048295 This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20230214 release. Security issues fixed: - CVE-2022-38090: Security updates for [INTEL-SA-00767] - CVE-2022-33196: Security updates for [INTEL-SA-00738] - CVE-2022-21216: Security updates for [INTEL-SA-00700] - ... oval:org.secpod.oval:def:19500229 Insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. Incorrect calculation in microcode keying mechanism for some 3rd Generatio ... oval:org.secpod.oval:def:1601669 Incorrect default permissions in some memory controller configurations for some Intel Xeon Processors when using Intel Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access oval:org.secpod.oval:def:126027 The microcode_ctl utility is a companion to the microcode driver written by Tigran Aivazian tigranaivazian.fsnet.co.uk. The microcode update is volatile and needs to be uploaded on each system boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts back to the old microcode. oval:org.secpod.oval:def:126022 The microcode_ctl utility is a companion to the microcode driver written by Tigran Aivazian tigranaivazian.fsnet.co.uk. The microcode update is volatile and needs to be uploaded on each system boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts back to the old microcode. |