CVE-2023-42667
Published: 14 August 2024
Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
From the Ubuntu Security Team
It was discovered that some Intel® Core™ Ultra Processors did not properly isolate the stream cache. A local authenticated user could potentially use this to escalate their privileges.
Priority
Status
Package | Release | Status |
---|---|---|
intel-microcode
Launchpad, Ubuntu, Debian |
bionic |
Released
(3.20240813.0ubuntu0.18.04.1+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
focal |
Released
(3.20240813.0ubuntu0.20.04.2)
|
|
jammy |
Released
(3.20240813.0ubuntu0.22.04.2)
|
|
noble |
Released
(3.20240813.0ubuntu0.24.04.2)
|
|
trusty |
Ignored
(trusty doesn't support early microcode loading at runtime)
|
|
upstream |
Released
(3.20240813.2)
|
|
xenial |
Released
(3.20240813.0ubuntu0.16.04.1+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches:
upstream: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/commit/cc27f99dbb6646c9fc298896bf95a82769c21838 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
References
- https://www.cve.org/CVERecord?id=CVE-2023-42667
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
- https://ubuntu.com/security/notices/USN-6967-1
- NVD
- Launchpad
- Debian