Headline
Ubuntu Security Notice USN-5612-1
Ubuntu Security Notice 5612-1 - Pietro Borrello, Andreas Kogler, Martin Schwarzl, Daniel Gruss, Michael Schwarz and Moritz Lipp discovered that some Intel processors did not properly clear data between subsequent xAPIC MMIO reads. This could allow a local attacker to compromise SGX enclaves.
=========================================================================Ubuntu Security Notice USN-5612-1September 15, 2022intel-microcode vulnerability=========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 22.04 LTS- Ubuntu 20.04 LTS- Ubuntu 18.04 LTSSummary:A security issue was fixed in Intel Microcode.Software Description:- intel-microcode: Processor microcode for Intel CPUsDetails:Pietro Borrello, Andreas Kogler, Martin Schwarzl, Daniel Gruss, MichaelSchwarz and Moritz Lipp discovered that some Intel processors did notproperly clear data between subsequent xAPIC MMIO reads. This could allow alocal attacker to compromise SGX enclaves.Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 22.04 LTS: intel-microcode 3.20220809.0ubuntu0.22.04.1Ubuntu 20.04 LTS: intel-microcode 3.20220809.0ubuntu0.20.04.1Ubuntu 18.04 LTS: intel-microcode 3.20220809.0ubuntu0.18.04.1After a standard system update you need to reboot your computer to makeall the necessary changes.References: https://ubuntu.com/security/notices/USN-5612-1 CVE-2022-21233Package Information: https://launchpad.net/ubuntu/+source/intel-microcode/3.20220809.0ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20220809.0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20220809.0ubuntu0.18.04.1
Related news
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
A group of researchers has revealed details of a new vulnerability affecting Intel CPUs that enables attackers to obtain encryption keys and other secret information from the processors. Dubbed ÆPIC Leak, the weakness is the first-of-its-kind to architecturally disclose sensitive data in a manner that's akin to an "uninitialized memory read in the CPU itself." "In contrast to transient execution