First published: Wed Aug 30 2023(Updated: )
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD processors utilising speculative execution and branch prediction may allow unauthorised memory reads via a speculative side-channel attack. A local attacker could use this to expose sensitive information, including kernel memory.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/amd64-microcode | <3.20220411.1ubuntu3.2 | 3.20220411.1ubuntu3.2 |
=23.04 | ||
All of | ||
ubuntu/amd64-microcode | <3.20191218.1ubuntu2.2 | 3.20191218.1ubuntu2.2 |
=22.04 | ||
All of | ||
ubuntu/amd64-microcode | <3.20191218.1ubuntu1.2 | 3.20191218.1ubuntu1.2 |
=20.04 | ||
All of | ||
ubuntu/amd64-microcode | <3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm2 | 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm2 |
=18.04 | ||
All of | ||
ubuntu/amd64-microcode | <3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm2 | 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm2 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6319-1 is high.
Ubuntu 23.04 is affected by the AMD Microcode vulnerability.
A local attacker can exploit this vulnerability by conducting a speculative side-channel attack to expose sensitive information, including kernel memory.
The remedy for the AMD Microcode vulnerability in Ubuntu 18.04 is version 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm2 of the amd64-microcode package.
You can find more information about USN-6319-1 on the Ubuntu Security website.