First published: Thu May 16 2024(Updated: )
Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/intel-microcode | <3.20240514.0ubuntu0.18.04.1+ | 3.20240514.0ubuntu0.18.04.1+ |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.20.04.1 | 3.20240514.0ubuntu0.20.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.22.04.1 | 3.20240514.0ubuntu0.22.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.23.10.1 | 3.20240514.0ubuntu0.23.10.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.24.04.1 | 3.20240514.0ubuntu0.24.04.1 |
ubuntu/intel-microcode | <3.20240514.0ubuntu0.16.04.1+ | 3.20240514.0ubuntu0.16.04.1+ |
debian/intel-microcode | <=3.20231114.1~deb11u1<=3.20231114.1~deb12u1 | 3.20240514.1~deb11u1 3.20240514.1~deb12u1 3.20240813.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45733 has a medium severity rating due to the potential for partial information disclosure through race conditions in Intel processors.
To fix CVE-2023-45733, update the intel-microcode package to the recommended versions for your specific Ubuntu or Debian distribution.
CVE-2023-45733 affects various Intel processors, particularly those associated with specific microcode updates.
CVE-2023-45733 is not considered exploitable remotely as it requires local authenticated access to be leveraged.
An attacker exploiting CVE-2023-45733 may gain access to partial information that could assist in further malicious activities.