ALAS-2024-2491

Related Vulnerabilities: CVE-2023-38575   CVE-2023-39368  

Non-transparent sharing of return predictor targets between contexts in some Intel® Processors may allow an authorized user to potentially enable information disclosure via local access. (CVE-2023-38575) Protection mechanism failure of bus lock regulator for some Intel® Processors may allow an unauthenticated user to potentially enable denial of service via network access. (CVE-2023-39368)

ALAS-2024-2491


Amazon Linux 2 Security Advisory: ALAS-2024-2491
Advisory Release Date: 2024-03-12 12:00 Pacific
Advisory Updated Date: 2024-03-12 12:00 Pacific
Severity: Medium

Issue Overview:

Non-transparent sharing of return predictor targets between contexts in some Intel® Processors may allow an authorized user to potentially enable information disclosure via local access. (CVE-2023-38575)

Protection mechanism failure of bus lock regulator for some Intel® Processors may allow an unauthenticated user to potentially enable denial of service via network access. (CVE-2023-39368)


Affected Packages:

microcode_ctl


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update microcode_ctl to update your system.

New Packages:
i686:
    microcode_ctl-2.1-47.amzn2.4.17.i686
    microcode_ctl-debuginfo-2.1-47.amzn2.4.17.i686

src:
    microcode_ctl-2.1-47.amzn2.4.17.src

x86_64:
    microcode_ctl-2.1-47.amzn2.4.17.x86_64
    microcode_ctl-debuginfo-2.1-47.amzn2.4.17.x86_64