First published: Wed Jun 20 2018(Updated: )
Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. This update provides the microcode updates for AMD 17H family processors required for the corresponding Linux kernel updates.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/amd64-microcode | <3.20180524.1~ubuntu0.18.04.1 | 3.20180524.1~ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/amd64-microcode | <3.20180524.1~ubuntu0.17.10.1 | 3.20180524.1~ubuntu0.17.10.1 |
=17.10 | ||
All of | ||
ubuntu/amd64-microcode | <3.20180524.1~ubuntu0.16.04.1 | 3.20180524.1~ubuntu0.16.04.1 |
=16.04 | ||
All of | ||
ubuntu/amd64-microcode | <3.20180524.1~ubuntu0.14.04.1 | 3.20180524.1~ubuntu0.14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this update is CVE-2017-5715.
The severity of CVE-2017-5715 is high.
CVE-2017-5715 allows unauthorized memory reads via side-channel attacks on microprocessors utilizing speculative execution and branch prediction, potentially exposing sensitive information, including kernel memory.
Ubuntu versions 18.04, 17.10, 16.04, and 14.04 are affected by CVE-2017-5715.
You can fix the CVE-2017-5715 vulnerability by updating the amd64-microcode package to version 3.20180524.1~ubuntu0.18.04.1 for Ubuntu 18.04, version 3.20180524.1~ubuntu0.17.10.1 for Ubuntu 17.10, version 3.20180524.1~ubuntu0.16.04.1 for Ubuntu 16.04, or version 3.20180524.1~ubuntu0.14.04.1 for Ubuntu 14.04.