drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in intel-microcode (Aktualisierung)
Name: |
Preisgabe von Informationen in intel-microcode (Aktualisierung) |
|
ID: |
USN-3531-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.10 |
|
Datum: |
Mo, 22. Januar 2018, 21:09 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu16.04.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu17.10.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu14.04.1 |
|
Applikationen: |
intel-microcode |
|
Update von: |
Preisgabe von Informationen in intel-microcode |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1975645200467327813== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="9vXE092ls0EwoN2praGsKshfFSlckCkvO"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --9vXE092ls0EwoN2praGsKshfFSlckCkvO Content-Type: multipart/mixed; boundary="6M751h947gCQQsoL7feMdxIvRke3Bs1Le"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <b0ae6649-a21b-a8fe-8e5f-0975f3f81242@canonical.com> Subject: [USN-3531-2] Intel Microcode regression
--6M751h947gCQQsoL7feMdxIvRke3Bs1Le Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3531-2 January 22, 2018
intel-microcode regression ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
USN-3531-1 introduced regressions in intel-microcode.
Software Description: - intel-microcode: Processor microcode for Intel CPUs
Details:
USN-3531-1 updated Intel microcode to the 20180108 release. Regressions were discovered in the microcode updates which could cause system instability on certain hardware platforms. At the request of Intel, we have reverted to the previous packaged microcode version, the 20170707 release.
Original advisory details:
It was discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715) This update provides the microcode updates required for the corresponding Linux kernel updates.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.10: intel-microcode 3.20180108.0+really20170707ubuntu17.10.1
Ubuntu 16.04 LTS: intel-microcode 3.20180108.0+really20170707ubuntu16.04.1
Ubuntu 14.04 LTS: intel-microcode 3.20180108.0+really20170707ubuntu14.04.1
After a standard system update you need to reboot your computer to make all the necessary changes.
References: https://www.ubuntu.com/usn/usn-3531-2 https://www.ubuntu.com/usn/usn-3531-1 https://launchpad.net/bugs/1742933
Package Information:
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu17.10.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu16.04.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu14.04.1
--6M751h947gCQQsoL7feMdxIvRke3Bs1Le--
--9vXE092ls0EwoN2praGsKshfFSlckCkvO Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJaZg4LAAoJEGVp2FWnRL6ThMYP/1HwrTEp1a+nbll/PtE6vDxK vp83apnEw6tE1oUE+q+oSn3lCcBz/lBx3GEo/88v/tw0FJ5Va1U+0sba5xN2ZUrl xXDiYDySjs0nSqupH+A2fDBM2jyHqMDfSQujplZORQuTprOESy6kqhgrOhz7l7oP vJwKRhyxJAFNTmxuAR1FGfQZV+wDEzLAmKLFvBod66L2WnellcL55Bs+UpjqqX1t wKoTgrZ+pNaAILcTp2atxu2ocFmK/KM/uYWo0ltvXY1h9EpXG8sND5+TQScgtnGI IctstkYdwP5hWLGXowgvP/X9RlnVg9YkX4eX7KN2DPS56IVrlJxbg6GL+hfmFDR+ iUo6jL63Aiyu/QrAatbgU9HcPnLDtYI8hArU3izNo4x71r3qxw7XiM00JM89GGs6 DZ2LS49tLwgWweRYuTlWS1U8Qr+s9vqGwpRSV4B1iSi0qHYZPh58AC3qp3lQ/Rr1 jIqvOgRtltRFMKxQyyKzOG/dzAFfYtxM6jtYhDP3CY5boPN7i3FBgATLu4yJwXbl 1OxKTO+mdcqYhcO7sA2064vFSfyLl3Hu/tA33qa5t5Jb5zL0LkLJI3eVdhTBVpQ+ sVXPe4PWAU6aMSAWh+7e/rskXPkgTsYZ8vA0xVHtpYTGBMGrgrPGyC0L7U3C4qfi ziIgztL+0S6uq7oIvKIf =i3Gv -----END PGP SIGNATURE-----
--9vXE092ls0EwoN2praGsKshfFSlckCkvO--
--===============1975645200467327813== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============1975645200467327813==--
|
|
|
|