Lucene search

K
ubuntuUbuntuUSN-6244-1
HistoryJul 25, 2023 - 12:00 a.m.

AMD Microcode vulnerability

2023-07-2500:00:00
ubuntu.com
67
ubuntu
amd processors
microcode vulnerability
speculative execution
sensitive information
tavis ormandy

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.6%

Releases

  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

  • amd64-microcode - Processor microcode firmware for AMD CPUs

Details

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local attacker
could use this to expose sensitive information.

OSVersionArchitecturePackageVersionFilename
Ubuntu23.04noarchamd64-microcode< 3.20220411.1ubuntu3.1UNKNOWN
Ubuntu22.04noarchamd64-microcode< 3.20191218.1ubuntu2.1UNKNOWN
Ubuntu20.04noarchamd64-microcode< 3.20191218.1ubuntu1.1UNKNOWN
Ubuntu18.04noarchamd64-microcode< 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm1UNKNOWN
Ubuntu18.04noarchamd64-microcode< 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1UNKNOWN
Ubuntu16.04noarchamd64-microcode< 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm1UNKNOWN
Ubuntu16.04noarchamd64-microcode< 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2UNKNOWN

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.6%