CVE-2023-28746
Published: 12 March 2024
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
From the Ubuntu Security Team
It was discovered that some IntelĀ® AtomĀ® Processors did not properly clear register state when performing various operations. A local attacker could use this to obtain sensitive information via a transient execution attack.
Priority
Status
| Package | Release | Status |
|---|---|---|
|
intel-microcode Launchpad, Ubuntu, Debian |
bionic |
Released
(3.20240514.0ubuntu0.18.04.1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
| focal |
Released
(3.20240514.0ubuntu0.20.04.1)
|
|
| jammy |
Released
(3.20240514.0ubuntu0.22.04.1)
|
|
| mantic |
Released
(3.20240514.0ubuntu0.23.10.1)
|
|
| noble |
Not vulnerable
(3.20240312.1build1)
|
|
| trusty |
Ignored
(trusty doesn't support early microcode loading at runtime)
|
|
| upstream |
Needs triage
|
|
| xenial |
Released
(3.20240514.0ubuntu0.16.04.1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.5 |
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |