First published: Tue Mar 12 2024(Updated: )
Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/intel-microcode | <3.20240514.0ubuntu0.18.04.1+ | 3.20240514.0ubuntu0.18.04.1+ |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.20.04.1 | 3.20240514.0ubuntu0.20.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.22.04.1 | 3.20240514.0ubuntu0.22.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.23.10.1 | 3.20240514.0ubuntu0.23.10.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.16.04.1+ | 3.20240514.0ubuntu0.16.04.1+ |
debian/intel-microcode | <=3.20231114.1~deb11u1<=3.20231114.1~deb12u1 | 3.20240514.1~deb11u1 3.20240514.1~deb12u1 3.20240813.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39368 is classified as a medium severity vulnerability that could lead to a denial of service.
To fix CVE-2023-39368, update the intel-microcode package to the specified versions based on your distribution.
CVE-2023-39368 affects certain Intel processors that utilize the intel-microcode package on Ubuntu and Debian systems.
Yes, CVE-2023-39368 can potentially be exploited by an unauthenticated user via network access.
You can determine your vulnerability to CVE-2023-39368 by checking the version of the intel-microcode package installed on your system.