Chipmakers Intel and AMD both released security advisories this Patch Tuesday. They have informed customers about a total of more than 100 vulnerabilities found in their products.
Intel has released 38 advisories covering over 80 vulnerabilities. The company has addressed nearly two dozen issues rated ‘high severity’ — the remaining bugs have been rated ‘medium severity’ and one is ‘low severity’.
High-severity vulnerabilities that can lead to privilege escalation have been resolved in QuickAssist Technology (QAT), the Retail Edge Mobile iOS application, Server Board BMC firmware, processors, WULT software, i915 Graphics drivers for Linux, Data Center Manager (DCM), Virtual RAID on CPU (VROC), Trace Analyzer and Collector, NUC firmware, System Usage Report (SUR), and One Boot Flash Update (OFU).
Medium-severity flaws have been addressed in Unite products, NUC products, Data Center Manager (DCM), Connect M Android application, MacCPUID, Integrated Performance Primitives (IPP), Setup and Configuration Software (SCS), Endpoint Management Assistant (EMA), Quartus Prime Pro, Smart Campus Android application, Digital Signal Processing (DSP), oneAPI Toolkit, FPGA firmware, and Pathfinder for RISC-V.
A majority of these vulnerabilities can be exploited for privilege escalation and some can lead to a DoS condition.
A low-severity issue that can lead to information disclosure was patched in the Open Cache Acceleration Software (CAS) for Linux maintained by Intel.
Patches are available for most vulnerabilities, and for some flaws the company has made available mitigations or workarounds.
AMD published two Patch Tuesday advisories: one describing 19 client vulnerabilities, and one covering 14 server vulnerabilities.
The client flaws — all with 2021 CVE identifiers — are low- and medium-severity issues affecting components of Athlon, Ryzen and Threadripper processors. Exploitation can lead to arbitrary code execution, DoS, or information disclosure.
AMD has released firmware updates that should address these vulnerabilities.
In the case of the server vulnerabilities, most of them have 2021 CVE identifiers and two have 2023 CVEs. There is one high- and 13 medium-severity issues that can lead to code execution, information disclosure, privilege escalation, or a DoS condition.
The security holes impact AMD Secure Processor (ASP), System Management Unit (SMU), Secure Encrypted Virtualization (SEV), and other platform components.
Related: Microsoft Patch Tuesday: 40 Vulnerabilities, 2 Zero-Days
Related: Adobe Patches 14 Vulnerabilities in Substance 3D Painter