First published: Thu Jan 11 2018(Updated: )
It was discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715) This update provides the microcode updates required for the corresponding Linux kernel updates.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/intel-microcode | <3.20180108.0~ubuntu17.10.1 | 3.20180108.0~ubuntu17.10.1 |
Ubuntu Ubuntu | =17.10 | |
All of | ||
ubuntu/intel-microcode | <3.20180108.0~ubuntu17.04.1 | 3.20180108.0~ubuntu17.04.1 |
Ubuntu Ubuntu | =17.04 | |
All of | ||
ubuntu/intel-microcode | <3.20180108.0~ubuntu16.04.2 | 3.20180108.0~ubuntu16.04.2 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/intel-microcode | <3.20180108.0~ubuntu14.04.2 | 3.20180108.0~ubuntu14.04.2 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3531-1 is a security notice issued by Ubuntu, addressing a vulnerability in the Intel Microcode.
USN-3531-1 addresses the Spectre vulnerability (CVE-2017-5715), which allows unauthorized memory reads via side-channel attacks.
The Spectre vulnerability affects microprocessors utilizing speculative execution and branch prediction, allowing unauthorized memory reads.
The Spectre vulnerability can be exploited by a local attacker to expose sensitive information, including kernel memory.
To mitigate the Spectre vulnerability, it is recommended to install the latest version (3.20180108.0~ubuntuXX.XX.X) of the intel-microcode package provided by Ubuntu.