You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa intel-microcode

Sigurnosni nedostaci programskog paketa intel-microcode

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4385-2
June 10, 2020

intel-microcode regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.04 LTS
– Ubuntu 19.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM

Summary:

USN-4385-1 introduced a regression in the Intel Microcode for some processors.

Software Description:
– intel-microcode: Processor microcode for Intel CPUs

Details:

USN-4385-1 provided updated Intel Processor Microcode. Unfortunately,
that update prevented certain processors in the Intel Skylake family
(06_4EH) from booting successfully. Additonally, on Ubuntu 20.04
LTS, late loading of microcode was enabled, which could lead to
system instability. This update reverts the microcode update for
the Skylake processor family and disables the late loading option on
Ubuntu 20.04 LTS.

Please note that the ‘dis_ucode_ldr’ kernel command line option can be
added in the boot menu to disable microcode loading for system recovery.

We apologize for the inconvenience.

Original advisory details:

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

It was discovered that on some Intel processors, partial data values
previously read from a vector register on a physical core may be propagated
into unused portions of the store buffer. A local attacker could possible
use this to expose sensitive information. (CVE-2020-0548)

It was discovered that on some Intel processors, data from the most
recently evicted modified L1 data cache (L1D) line may be propagated into
an unused (invalid) L1D fill buffer. A local attacker could possibly use
this to expose sensitive information. (CVE-2020-0549)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
intel-microcode 3.20200609.0ubuntu0.20.04.2

Ubuntu 19.10:
intel-microcode 3.20200609.0ubuntu0.19.10.2

Ubuntu 18.04 LTS:
intel-microcode 3.20200609.0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
intel-microcode 3.20200609.0ubuntu0.16.04.1

Ubuntu 14.04 ESM:
intel-microcode 3.20200609.0ubuntu0.14.04.1

After a standard system update you need to reboot your computer to
make all the necessary changes.

References:
https://usn.ubuntu.com/4385-2
https://usn.ubuntu.com/4385-1
https://launchpad.net/bugs/1882890, https://launchpad.net/bugs/1883002

Package Information:
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.2
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.2
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.1

—–BEGIN PGP SIGNATURE—–
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=Mfuu
—–END PGP SIGNATURE—–

AutorGoran Culibrk
Cert idNCERT-REF-2020-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa roundcube

Otkriveni su sigurnosni nedostaci u programskom paketu roundcube za operacijski sustav Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje XSS napada....

Close