Ubuntu 5486-1: Intel Microcode vulnerabilities | LinuxSecurity.com

Advisories

==========================================================================
Ubuntu Security Notice USN-5486-1
June 20, 2022

intel-microcode vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Intel Microcode.

Software Description:
- intel-microcode: Processor microcode for Intel CPUs

Details:

It was discovered that some Intel processors did not implement sufficient
control flow management. A local attacker could use this to cause a denial
of service. (CVE-2021-0127)

Joseph Nuzman discovered that some Intel processors did not properly
initialise shared resources. A local attacker could use this to obtain
sensitive information. (CVE-2021-0145)

Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel
processors did not prevent test and debug logic from being activated at
runtime. A local attacker could use this to escalate
privileges. (CVE-2021-0146)

It was discovered that some Intel processors did not properly restrict
access in some situations. A local attacker could use this to obtain
sensitive information. (CVE-2021-33117)

Brandon Miller discovered that some Intel processors did not properly
restrict access in some situations. A local attacker could use this to
obtain sensitive information or a remote attacker could use this to cause a
denial of service. (CVE-2021-33120)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123,
CVE-2022-21127)

Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that
some Intel processors improperly optimised security-critical code. A local
attacker could possibly use this to expose sensitive
information. (CVE-2022-21151)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  intel-microcode                 3.20220510.0ubuntu0.22.04.1

Ubuntu 21.10:
  intel-microcode                 3.20220510.0ubuntu0.21.10.1

Ubuntu 20.04 LTS:
  intel-microcode                 3.20220510.0ubuntu0.20.04.1

Ubuntu 18.04 LTS:
  intel-microcode                 3.20220510.0ubuntu0.18.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5486-1
  CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117,
  CVE-2021-33120, CVE-2022-21123, CVE-2022-21127, CVE-2022-21151,
  CVE-2022-21166

Package Information:
  https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.22.04.1
  https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.21.10.1
  https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.20.04.1
  https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.18.04.1

Ubuntu 5486-1: Intel Microcode vulnerabilities

June 20, 2022

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 21.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in Intel Microcode. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: It was discovered that some Intel processors did not implement sufficient control flow management. A local attacker could use this to cause a denial of service. (CVE-2021-0127) Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. (CVE-2021-0145) Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges. (CVE-2021-0146) It was discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information. (CVE-2021-33117) Brandon Miller discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information or a remote attacker could use this to cause a denial of service. (CVE-2021-33120) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123, CVE-2022-21127) Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that some Intel processors improperly optimised security-critical code. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21151) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: intel-microcode 3.20220510.0ubuntu0.22.04.1 Ubuntu 21.10: intel-microcode 3.20220510.0ubuntu0.21.10.1 Ubuntu 20.04 LTS: intel-microcode 3.20220510.0ubuntu0.20.04.1 Ubuntu 18.04 LTS: intel-microcode 3.20220510.0ubuntu0.18.04.1 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5486-1

CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117,

CVE-2021-33120, CVE-2022-21123, CVE-2022-21127, CVE-2022-21151,

CVE-2022-21166

Severity
Ubuntu Security Notice USN-5486-1

Package Information

https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.21.10.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20220510.0ubuntu0.18.04.1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.