CVE Vulnerabilities

CVE-2023-46103

Sequence of Processor Instructions Leads to Unexpected Behavior

Published: May 16, 2024 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.

Weakness

Specific combinations of processor instructions lead to undesirable behavior such as locking the processor until a hard reset performed.

Affected Software

Name Vendor Start Version End Version
Intel-microcode Ubuntu devel *
Intel-microcode Ubuntu esm-infra-legacy/trusty *
Intel-microcode Ubuntu esm-infra/bionic *
Intel-microcode Ubuntu esm-infra/xenial *
Intel-microcode Ubuntu focal *
Intel-microcode Ubuntu jammy *
Intel-microcode Ubuntu mantic *
Intel-microcode Ubuntu noble *
Intel-microcode Ubuntu trusty/esm *
Red Hat Enterprise Linux 9 RedHat microcode_ctl-4:20230808-2.20240531.1.el9_4 *
Red Hat Enterprise Linux 9 RedHat microcode_ctl-4:20240910-1.el9_5 *

Extended Description

If the instruction set architecture (ISA) and processor logic are not designed carefully and tested thoroughly, certain combinations of instructions may lead to locking the processor or other unexpected and undesirable behavior. Upon encountering unimplemented instruction opcodes or illegal instruction operands, the processor should throw an exception and carry on without negatively impacting security. However, specific combinations of legal and illegal instructions may cause unexpected behavior with security implications such as allowing unprivileged programs to completely lock the CPU.

Potential Mitigations

References