Lucene search

K
ubuntuUbuntuUSN-6319-1
HistoryAug 30, 2023 - 12:00 a.m.

AMD Microcode vulnerability

2023-08-3000:00:00
ubuntu.com
48
ubuntu
amd
microcode

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

26.1%

Releases

  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

  • amd64-microcode - Processor microcode firmware for AMD CPUs

Details

Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.

OSVersionArchitecturePackageVersionFilename
Ubuntu23.04noarchamd64-microcode< 3.20220411.1ubuntu3.2UNKNOWN
Ubuntu22.04noarchamd64-microcode< 3.20191218.1ubuntu2.2UNKNOWN
Ubuntu20.04noarchamd64-microcode< 3.20191218.1ubuntu1.2UNKNOWN
Ubuntu18.04noarchamd64-microcode< 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm2UNKNOWN
Ubuntu18.04noarchamd64-microcode< 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1UNKNOWN
Ubuntu16.04noarchamd64-microcode< 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm2UNKNOWN
Ubuntu16.04noarchamd64-microcode< 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2UNKNOWN

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

26.1%