Ubuntu 3756-1: Intel Microcode vulnerabilities

    Date27 Aug 2018
    Posted ByAnthony Pell
    The system could be made to expose sensitive information.
    Ubuntu Security Notice USN-3756-1
    August 27, 2018
    intel-microcode vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    The system could be made to expose sensitive information.
    Software Description:
    - intel-microcode: Processor microcode for Intel CPUs
    It was discovered that memory present in the L1 data cache of an Intel CPU
    core may be exposed to a malicious process that is executing on the CPU
    core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local
    attacker in a guest virtual machine could use this to expose sensitive
    information (memory from other guests or the host OS). (CVE-2018-3646)
    Jann Horn and Ken Johnson discovered that microprocessors utilizing
    speculative execution of a memory read may allow unauthorized memory reads
    via a sidechannel attack. This flaw is known as Spectre Variant 4. A local
    attacker could use this to expose sensitive information, including kernel
    memory. (CVE-2018-3639)
    Zdenek Sojka, Rudolf Marek, Alex Zuepke, and Innokentiy Sennovskiy
    discovered that microprocessors that perform speculative reads of
    system registers may allow unauthorized disclosure of system parameters
    via a sidechannel attack. This vulnerability is also known as Rogue
    System Register Read (RSRE). An attacker could use this to expose
    sensitive information. (CVE-2018-3640)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 18.04 LTS:
      intel-microcode                 3.20180807a.0ubuntu0.18.04.1
    Ubuntu 16.04 LTS:
      intel-microcode                 3.20180807a.0ubuntu0.16.04.1
    Ubuntu 14.04 LTS:
      intel-microcode                 3.20180807a.0ubuntu0.14.04.1
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
      CVE-2018-3639, CVE-2018-3640, CVE-2018-3646
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"34","type":"x","order":"1","pct":91.89,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"2","type":"x","order":"2","pct":5.41,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"1","type":"x","order":"3","pct":2.7,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.