First published: Tue Nov 12 2019(Updated: )
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135) It was discovered that certain Intel Xeon processors did not properly restrict access to a voltage modulation interface. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2019-11139)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/intel-microcode | <3.20191112-0ubuntu0.19.10.2 | 3.20191112-0ubuntu0.19.10.2 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/intel-microcode | <3.20191112-0ubuntu0.19.04.2 | 3.20191112-0ubuntu0.19.04.2 |
Ubuntu Ubuntu | =19.04 | |
All of | ||
ubuntu/intel-microcode | <3.20191112-0ubuntu0.18.04.2 | 3.20191112-0ubuntu0.18.04.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/intel-microcode | <3.20191112-0ubuntu0.16.04.2 | 3.20191112-0ubuntu0.16.04.2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4182-1 is high.
To fix USN-4182-1, update the intel-microcode package to version 3.20191112-0ubuntu0.19.10.2 (for Ubuntu 19.10), 3.20191112-0ubuntu0.19.04.2 (for Ubuntu 19.04), 3.20191112-0ubuntu0.18.04.2 (for Ubuntu 18.04), or 3.20191112-0ubuntu0.16.04.2 (for Ubuntu 16.04).
USN-4182-1 affects Intel processors using Transactional Synchronization Extensions (TSX).
The CVE identifier for the vulnerability addressed in USN-4182-1 is CVE-2019-11135.