Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Intel Microcode (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Intel Microcode (Aktualisierung)
ID: USN-4385-2
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 14.04 ESM, Ubuntu 19.10, Ubuntu 20.04 LTS
Datum: Do, 11. Juni 2020, 07:25
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549
Applikationen: intel-microcode
Update von: Mehrere Probleme in Intel Microcode

Originalnachricht


--===============0253545335945498627==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="YhFoJY/gx7awiIuK"
Content-Disposition: inline


--YhFoJY/gx7awiIuK
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4385-2
June 10, 2020

intel-microcode regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 19.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM

Summary:

USN-4385-1 introduced a regression in the Intel Microcode for some processors.

Software Description:
- intel-microcode: Processor microcode for Intel CPUs

Details:

USN-4385-1 provided updated Intel Processor Microcode. Unfortunately,
that update prevented certain processors in the Intel Skylake family
(06_4EH) from booting successfully. Additonally, on Ubuntu 20.04
LTS, late loading of microcode was enabled, which could lead to
system instability. This update reverts the microcode update for
the Skylake processor family and disables the late loading option on
Ubuntu 20.04 LTS.

Please note that the 'dis_ucode_ldr' kernel command line option can be
added in the boot menu to disable microcode loading for system recovery.

We apologize for the inconvenience.

Original advisory details:

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

It was discovered that on some Intel processors, partial data values
previously read from a vector register on a physical core may be propagated
into unused portions of the store buffer. A local attacker could possible
use this to expose sensitive information. (CVE-2020-0548)

It was discovered that on some Intel processors, data from the most
recently evicted modified L1 data cache (L1D) line may be propagated into
an unused (invalid) L1D fill buffer. A local attacker could possibly use
this to expose sensitive information. (CVE-2020-0549)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
intel-microcode 3.20200609.0ubuntu0.20.04.2

Ubuntu 19.10:
intel-microcode 3.20200609.0ubuntu0.19.10.2

Ubuntu 18.04 LTS:
intel-microcode 3.20200609.0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
intel-microcode 3.20200609.0ubuntu0.16.04.1

Ubuntu 14.04 ESM:
intel-microcode 3.20200609.0ubuntu0.14.04.1

After a standard system update you need to reboot your computer to
make all the necessary changes.

References:
https://usn.ubuntu.com/4385-2
https://usn.ubuntu.com/4385-1
https://launchpad.net/bugs/1882890, https://launchpad.net/bugs/1883002

Package Information:
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.2
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.2
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.1


--YhFoJY/gx7awiIuK
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=Mfuu
-----END PGP SIGNATURE-----

--YhFoJY/gx7awiIuK--


--===============0253545335945498627==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung