CVE-2023-38575
Published: 12 March 2024
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
From the Ubuntu Security Team
It was discovered that some Intel️® Processors did not properly clear the state of various hardware structures when switching execution contexts. A local attacker could use this to access privileged information.
Priority
Status
Package | Release | Status |
---|---|---|
intel-microcode Launchpad, Ubuntu, Debian |
bionic |
Needed
|
focal |
Needed
|
|
jammy |
Needed
|
|
mantic |
Needed
|
|
trusty |
Ignored
(trusty doesn't support early microcode loading at runtime)
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |