Debian Intel-Microcode vulnerabilities
90 known vulnerabilities affecting debian/intel-microcode.
Total CVEs
90
CISA KEV
0
Public exploits
2
Exploited in wild
1
Severity breakdown
HIGH21MEDIUM66LOW3
Vulnerabilities
Page 3 of 5
CVE-2023-42667HIGHCVSS 7.3fixed in intel-microcode 3.20240813.1~deb12u1 (bookworm)2023
CVE-2023-42667 [HIGH] CVE-2023-42667: intel-microcode - Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechani...
Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
Scope: local
bookworm: resolved (fixed in 3.20240813.1~deb12u1)
bullseye: resolved (fixed in 3.20240813.1~deb11u1)
forky: resolved (fixed in 3.20240813.1)
sid: resolved (fixed in 3.
debian
CVE-2023-23583HIGHCVSS 8.8fixed in intel-microcode 3.20231114.1~deb12u1 (bookworm)2023
CVE-2023-23583 [HIGH] CVE-2023-23583: intel-microcode - Sequence of processor instructions leads to unexpected behavior for some Intel(R...
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Scope: local
bookworm: resolved (fixed in 3.20231114.1~deb12u1)
bullseye: resolved (fixed in 3.20231114.1~deb11u1)
f
debian
CVE-2023-22655MEDIUMCVSS 6.1fixed in intel-microcode 3.20240312.1~deb12u1 (bookworm)2023
CVE-2023-22655 [MEDIUM] CVE-2023-22655: intel-microcode - Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Pro...
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Scope: local
bookworm: resolved (fixed in 3.20240312.1~deb12u1)
bullseye: resolved (fixed in 3.20240312.1~deb11u1)
forky: resolved (fixed
debian
CVE-2023-38575MEDIUMCVSS 5.5fixed in intel-microcode 3.20240312.1~deb12u1 (bookworm)2023
CVE-2023-38575 [MEDIUM] CVE-2023-38575: intel-microcode - Non-transparent sharing of return predictor targets between contexts in some Int...
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20240312.1~deb12u1)
bullseye: resolved (fixed in 3.20240312.1~deb11u1)
forky: resolved (fixed in 3.20240312.1)
sid: resolved
debian
CVE-2023-28746MEDIUMCVSS 6.5fixed in intel-microcode 3.20240312.1~deb12u1 (bookworm)2023
CVE-2023-28746 [MEDIUM] CVE-2023-28746: intel-microcode - Information exposure through microarchitectural state after transient execution ...
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20240312.1~deb12u1)
bullseye: resolved (fixed in 3.20240312.1~deb11u1)
forky:
debian
CVE-2023-47855MEDIUMCVSS 6.0fixed in intel-microcode 3.20240514.1~deb12u1 (bookworm)2023
CVE-2023-47855 [MEDIUM] CVE-2023-47855: intel-microcode - Improper input validation in some Intel(R) TDX module software before version 1....
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
Scope: local
bookworm: resolved (fixed in 3.20240514.1~deb12u1)
bullseye: resolved (fixed in 3.20240514.1~deb11u1)
forky: resolved (fixed in 3.20240514.1)
sid: resolved (fixe
debian
CVE-2023-46103MEDIUMCVSS 4.7fixed in intel-microcode 3.20240514.1~deb12u1 (bookworm)2023
CVE-2023-46103 [MEDIUM] CVE-2023-46103: intel-microcode - Sequence of processor instructions leads to unexpected behavior in Intel(R) Core...
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Scope: local
bookworm: resolved (fixed in 3.20240514.1~deb12u1)
bullseye: resolved (fixed in 3.20240514.1~deb11u1)
forky: resolved (fixed in 3.20240514.1)
sid: resolv
debian
CVE-2023-23908MEDIUMCVSS 6.0fixed in intel-microcode 3.20230808.1~deb12u1 (bookworm)2023
CVE-2023-23908 [MEDIUM] CVE-2023-23908: intel-microcode - Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable process...
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20230808.1~deb12u1)
bullseye: resolved (fixed in 3.20230808.1~deb11u1)
forky: resolved (fixed in 3.20230808.1)
sid: resolved (fixed in 3.20
debian
CVE-2023-43490MEDIUMCVSS 5.3fixed in intel-microcode 3.20240312.1~deb12u1 (bookworm)2023
CVE-2023-43490 [MEDIUM] CVE-2023-43490: intel-microcode - Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D ...
Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20240312.1~deb12u1)
bullseye: resolved (fixed in 3.20240312.1~deb11u1)
forky: resolved (fixed in 3.20240312.1)
sid
debian
CVE-2023-39368MEDIUMCVSS 6.5fixed in intel-microcode 3.20240312.1~deb12u1 (bookworm)2023
CVE-2023-39368 [MEDIUM] CVE-2023-39368: intel-microcode - Protection mechanism failure of bus lock regulator for some Intel(R) Processors ...
Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.
Scope: local
bookworm: resolved (fixed in 3.20240312.1~deb12u1)
bullseye: resolved (fixed in 3.20240312.1~deb11u1)
forky: resolved (fixed in 3.20240312.1)
sid: resolved (fixed in 3.202
debian
CVE-2023-45733LOWCVSS 2.8fixed in intel-microcode 3.20240514.1~deb12u1 (bookworm)2023
CVE-2023-45733 [LOW] CVE-2023-45733: intel-microcode - Hardware logic contains race conditions in some Intel(R) Processors may allow an...
Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20240514.1~deb12u1)
bullseye: resolved (fixed in 3.20240514.1~deb11u1)
forky: resolved (fixed in 3.20240514.1)
sid: resolved (fixed in 3.20240514.
debian
CVE-2022-21216HIGHCVSS 7.5fixed in intel-microcode 3.20230214.1 (bookworm)2022
CVE-2022-21216 [HIGH] CVE-2022-21216: intel-microcode - Insufficient granularity of access control in out-of-band management in some Int...
Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.
Scope: local
bookworm: resolved (fixed in 3.20230214.1)
bullseye: resolved (fixed in 3.20230214.1~deb11u1)
forky: resolved (fixed i
debian
CVE-2022-41804HIGHCVSS 7.2fixed in intel-microcode 3.20230808.1~deb12u1 (bookworm)2022
CVE-2022-41804 [HIGH] CVE-2022-41804: intel-microcode - Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) X...
Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Scope: local
bookworm: resolved (fixed in 3.20230808.1~deb12u1)
bullseye: resolved (fixed in 3.20230808.1~deb11u1)
forky: resolved (fixed in 3.20230808.1)
sid: resolved (
debian
CVE-2022-33196HIGHCVSS 7.2fixed in intel-microcode 3.20230214.1 (bookworm)2022
CVE-2022-33196 [HIGH] CVE-2022-33196: intel-microcode - Incorrect default permissions in some memory controller configurations for some ...
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Scope: local
bookworm: resolved (fixed in 3.20230214.1)
bullseye: resolved (fixed in 3.20230214.1~deb11u1)
f
debian
CVE-2022-21233MEDIUMCVSS 5.5fixed in intel-microcode 3.20220809.1 (bookworm)2022
CVE-2022-21233 [MEDIUM] CVE-2022-21233: intel-microcode - Improper isolation of shared resources in some Intel(R) Processors may allow a p...
Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20220809.1)
bullseye: resolved (fixed in 3.20230214.1~deb11u1)
forky: resolved (fixed in 3.20220809.1)
sid: resolved (fixed in 3.20220809.1)
trixie: resolve
debian
CVE-2022-21125MEDIUMCVSS 5.5fixed in intel-microcode 3.20220510.1 (bookworm)2022
CVE-2022-21125 [MEDIUM] CVE-2022-21125: intel-microcode - Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processor...
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20220510.1)
bullseye: resolved (fixed in 3.20220510.1~deb11u1)
forky: resolved (fixed in 3.20220510.1)
sid: resolved (fixed in 3.20220510
debian
CVE-2022-40982MEDIUMCVSS 6.5fixed in intel-microcode 3.20230808.1~deb12u1 (bookworm)2022
CVE-2022-40982 [MEDIUM] CVE-2022-40982: intel-microcode - Information exposure through microarchitectural state after transient execution ...
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20230808.1~deb12u1)
bullseye: resolved (fixed in 3.20230808.1~deb11u1)
forky
debian
CVE-2022-21127MEDIUMCVSS 5.5fixed in intel-microcode 3.20220510.1 (bookworm)2022
CVE-2022-21127 [MEDIUM] CVE-2022-21127: intel-microcode - Incomplete cleanup in specific special register read operations for some Intel(R...
Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20220510.1)
bullseye: resolved (fixed in 3.20220510.1~deb11u1)
forky: resolved (fixed in 3.20220510.1)
sid: resolved (fixed in
debian
CVE-2022-21166MEDIUMCVSS 5.5fixed in intel-microcode 3.20220510.1 (bookworm)2022
CVE-2022-21166 [MEDIUM] CVE-2022-21166: intel-microcode - Incomplete cleanup in specific special register write operations for some Intel(...
Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20220510.1)
bullseye: resolved (fixed in 3.20220510.1~deb11u1)
forky: resolved (fixed in 3.20220510.1)
sid: resolved (fixed i
debian
CVE-2022-21151MEDIUMCVSS 5.5fixed in intel-microcode 3.20220510.1 (bookworm)2022
CVE-2022-21151 [MEDIUM] CVE-2022-21151: intel-microcode - Processor optimization removal or modification of security-critical code for som...
Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Scope: local
bookworm: resolved (fixed in 3.20220510.1)
bullseye: resolved (fixed in 3.20220510.1~deb11u1)
forky: resolved (fixed in 3.20220510.1)
sid: resolved
debian