7.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
0.001 Low
EPSS
Percentile
47.8%
Medium
Canonical Ubuntu
Daniel Moghimi discovered that some Intel® Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. (CVE-2022-40982) It was discovered that some Intel® Xeon® Processors did not properly restrict error injection for Intel® SGX or Intel® TDX. A local privileged user could use this to further escalate their privileges. (CVE-2022-41804) It was discovered that some 3rd Generation Intel® Xeon® Scalable processors did not properly restrict access in some situations. A local privileged attacker could use this to obtain sensitive information. (CVE-2023-23908) Update Instructions: Run sudo pro fix USN-6286-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: intel-microcode – 3.20230808.0ubuntu0.16.04.1+esm1 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2022-40982, CVE-2022-41804, CVE-2023-23908.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below.
The Cloud Foundry project recommends upgrading the following releases:
2023-10-05: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
jammy stemcells | lt | 1.207 | |
cf deployment | lt | 1.207 |
7.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
0.001 Low
EPSS
Percentile
47.8%