Mehrere Probleme in Intel Microcode (Aktualisierung)
ID: | USN-4385-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 14.04 ESM, Ubuntu 19.10, Ubuntu 20.04 LTS |
Datum: | Do, 11. Juni 2020, 07:25 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549 |
Applikationen: | intel-microcode |
Update von: | Mehrere Probleme in Intel Microcode |
Originalnachricht |
|
--===============0253545335945498627== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="YhFoJY/gx7awiIuK" Content-Disposition: inline --YhFoJY/gx7awiIuK Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-4385-2 June 10, 2020 intel-microcode regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: USN-4385-1 introduced a regression in the Intel Microcode for some processors. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: USN-4385-1 provided updated Intel Processor Microcode. Unfortunately, that update prevented certain processors in the Intel Skylake family (06_4EH) from booting successfully. Additonally, on Ubuntu 20.04 LTS, late loading of microcode was enabled, which could lead to system instability. This update reverts the microcode update for the Skylake processor family and disables the late loading option on Ubuntu 20.04 LTS. Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery. We apologize for the inconvenience. Original advisory details: It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543) It was discovered that on some Intel processors, partial data values previously read from a vector register on a physical core may be propagated into unused portions of the store buffer. A local attacker could possible use this to expose sensitive information. (CVE-2020-0548) It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. A local attacker could possibly use this to expose sensitive information. (CVE-2020-0549) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: intel-microcode 3.20200609.0ubuntu0.20.04.2 Ubuntu 19.10: intel-microcode 3.20200609.0ubuntu0.19.10.2 Ubuntu 18.04 LTS: intel-microcode 3.20200609.0ubuntu0.18.04.1 Ubuntu 16.04 LTS: intel-microcode 3.20200609.0ubuntu0.16.04.1 Ubuntu 14.04 ESM: intel-microcode 3.20200609.0ubuntu0.14.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://usn.ubuntu.com/4385-2 https://usn.ubuntu.com/4385-1 https://launchpad.net/bugs/1882890, https://launchpad.net/bugs/1883002 Package Information: https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.2 https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.2 https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.1 --YhFoJY/gx7awiIuK Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAl7hW28ACgkQLwmejQBe gfQIRw/9FJ1USxsO4mXrYwtPJBeTvcAEo6iPWKKZhBM1GpsZGnI+KAaeAFBVd8V2 H2G5BcCqvOVCb1cRUj4Lv1DM6GQksUIfIBL7ZmOVraq6j6KBi46ncvlqwX1FdjsO maOFtijtgptRY7h3sv+rKMO+0VPpM2jDSF31SwZZkhpCqEaRGj5xhQ4e5pNwQL+4 BBCkE5S92NFng5IRcIatbYqZc1XvU8Mucdw7bT074dUdpTSqQfbyeozPw/V6tR1D dLp7/lcnK7q8/Do1UoSFjWY8Ri4Cb4Zc1gALZ1Dq8S/WDmRZtaBVGkbDsVCUQ6hI 7F0G2BnSJ0qbjSisyLu14wn1rcwwQC4S9CO91UC1/iJl1f0ecOVmmgO0LiLVk5eb qAyAxqL5zs8Q/bTalZHt6eFiPFE7TFp7aJkiI6C0ONlNh45/a5bl+tgAe5mg6T/8 gIPBeJpt2rvbtRfsEdju9WKYnxTAmoTlUmVxlZUwr665IaQicRXmGMJX0lTC4p9s xXId9gCXJf6KuOMYVSB/qaBWpKBinkzlmg7vE7759s41KEM0e5k+v4PoMHKgQO+Y wYSNOGSBBncS/8psUdnJKNe8EZ+nrmfIDBkjPGlf7DvyP0InT0pbwnRc2AQJjn8u ubr8/bXSoYRDwrS0xXewKeMcBte07cuFg198CSaU4UHxx1OBzIw= =Mfuu -----END PGP SIGNATURE----- --YhFoJY/gx7awiIuK-- --===============0253545335945498627== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce |