First published: Fri Jul 01 2022(Updated: )
It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-oem-20.04c | <5.14.0.1044.40 | 5.14.0.1044.40 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04b | <5.14.0.1044.40 | 5.14.0.1044.40 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-oem-20.04 | <5.14.0.1044.40 | 5.14.0.1044.40 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/linux-image-5.14.0-1044-oem | <5.14.0-1044.49 | 5.14.0-1044.49 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-5485-2 is not specified in the provided information.
The provided information does not specify how the vulnerabilities in USN-5485-2 can be exploited.
The affected software versions for USN-5485-2 are linux-image-oem-20.04c, linux-image-oem-20.04b, linux-image-oem-20.04d, linux-image-oem-20.04, and linux-image-5.14.0-1044-oem.
To fix the vulnerabilities in USN-5485-2, update the affected software versions to linux-image-oem-20.04c version 5.14.0.1044.40 or higher, linux-image-oem-20.04b version 5.14.0.1044.40 or higher, linux-image-oem-20.04d version 5.14.0.1044.40 or higher, linux-image-oem-20.04 version 5.14.0.1044.40 or higher, or linux-image-5.14.0-1044-oem version 5.14.0-1044.49 or higher.
You can find more information about USN-5485-2 at the following references: [CVE-2022-21125](https://ubuntu.com/security/CVE-2022-21125), [CVE-2022-21123](https://ubuntu.com/security/CVE-2022-21123), [CVE-2022-21166](https://ubuntu.com/security/CVE-2022-21166).