CVE-2021-33120
Published: 9 February 2022
Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.
From the Ubuntu Security Team
Brandon Miller discovered that some Intel processors did not properly restrict access in some situations. This may allow a local authenticated user to obtain sensitive information or allow a remote user to cause a denial of service.
Priority
Status
Package | Release | Status |
---|---|---|
intel-microcode Launchpad, Ubuntu, Debian |
bionic |
Released
(3.20220510.0ubuntu0.18.04.1)
|
focal |
Released
(3.20220510.0ubuntu0.20.04.1)
|
|
impish |
Released
(3.20220510.0ubuntu0.21.10.1)
|
|
jammy |
Released
(3.20220510.0ubuntu0.22.04.1)
|
|
kinetic |
Released
(3.20220207.1ubuntu1)
|
|
trusty |
Ignored
(early microcode loading not allowed)
|
|
upstream |
Released
(3.20220207.1)
|
|
xenial |
Released
(3.20220510.0ubuntu0.16.04.1+esm1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.4 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L |