VYPR

rpm package

suse/ucode-intel&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP5

pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Vulnerabilities (42)

  • CVE-2024-24968MedSep 16, 2024
    affected < 20240910-143.1fixed 20240910-143.1

    Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of service via local access.

  • CVE-2024-23984MedSep 16, 2024
    affected < 20240910-143.1fixed 20240910-143.1

    Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2024-25939MedAug 14, 2024
    affected < 20240813-140.1fixed 20240813-140.1

    Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.

  • CVE-2024-24980MedAug 14, 2024
    affected < 20240813-140.1fixed 20240813-140.1

    Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2024-24853HigAug 14, 2024
    affected < 20240813-140.1fixed 20240813-140.1

    Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-49141HigAug 14, 2024
    affected < 20240813-140.1fixed 20240813-140.1

    Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2023-42667HigAug 14, 2024
    affected < 20240813-140.1fixed 20240813-140.1

    Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2023-46103MedMay 16, 2024
    affected < 20240514-137.1fixed 20240514-137.1

    Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2023-45733LowMay 16, 2024
    affected < 20240514-137.1fixed 20240514-137.1

    Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.

  • CVE-2023-47855May 16, 2024
    affected < 20240514-137.1fixed 20240514-137.1

    Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-45745May 16, 2024
    affected < 20240514-137.1fixed 20240514-137.1

    Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-43490MedMar 14, 2024
    affected < 20240312-134.1fixed 20240312-134.1

    Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2023-39368MedMar 14, 2024
    affected < 20240312-134.1fixed 20240312-134.1

    Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.

  • CVE-2023-38575MedMar 14, 2024
    affected < 20240312-134.1fixed 20240312-134.1

    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

  • CVE-2023-28746MedMar 14, 2024
    affected < 20240312-134.1fixed 20240312-134.1

    Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2023-22655MedMar 14, 2024
    affected < 20240312-134.1fixed 20240312-134.1

    Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-23583Nov 14, 2023
    affected < 20231113-128.1fixed 20231113-128.1

    Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

  • CVE-2022-41804Aug 11, 2023
    affected < 20230808-123.1fixed 20230808-123.1

    Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-23908Aug 11, 2023
    affected < 20230808-123.1fixed 20230808-123.1

    Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2022-40982Aug 11, 2023
    affected < 20230808-123.1fixed 20230808-123.1

    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Page 1 of 3

VYPR — Vulnerability Intelligence