TencentOS Server 3: microcode_ctl (TSSA-2025:0682)

high Nessus Plugin ID 253471

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2025:0682 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2024-28956:
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVE-2024-43420:
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information disclosure via local access.

CVE-2024-45332:
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVE-2025-20012:
Incorrect behavior order for some Intel(R) Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.

CVE-2025-20623:
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.

CVE-2025-24495:
Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20250682.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495

Plugin Details

Severity: High

ID: 253471

File Name: tencentos_TSSA_2025_0682.nasl

Version: 1.1

Type: local

Published: 8/21/2025

Updated: 8/21/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:microcode_ctl

Required KB Items: Host/local_checks_enabled, Host/etc/os-release, Host/TencentOS/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 7/14/2025

Vulnerability Publication Date: 7/14/2025