{"id":23242,"date":"2018-03-29T23:36:34","date_gmt":"2018-03-29T14:36:34","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3531-3-intel-microcode-update\/"},"modified":"2018-03-30T01:34:22","modified_gmt":"2018-03-29T16:34:22","slug":"usn-3531-3-intel-microcode-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3531-3-intel-microcode-update\/","title":{"rendered":"USN-3531-3: intel-microcode update"},"content":{"rendered":"<p>USN-3531-3: intel-microcode update<\/p>\n<h2 id=\"intel-microcode-update\">intel-microcode update<\/h2>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.10<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3 id=\"summary\">Summary<\/h3>\n<p>The system could be made to expose sensitive information.<\/p>\n<h3 id=\"software-description\">Software Description<\/h3>\n<ul>\n<li>intel-microcode &#8211; Processor microcode for Intel CPUs<\/li>\n<\/ul>\n<h3 id=\"details\">Details<\/h3>\n<p>Jann Horn discovered that microprocessors utilizing speculative execution<br \/>\nand branch prediction may allow unauthorized memory reads via sidechannel<br \/>\nattacks. This flaw is known as Spectre. A local attacker could use this to<br \/>\nexpose sensitive information, including kernel memory. (CVE-2017-5715)<\/p>\n<p>This update provides the corrected microcode updates required for the<br \/>\ncorresponding Linux kernel updates.<\/p>\n<h2 id=\"update-instructions\">Update instructions<\/h2>\n<p>The problem can be corrected by updating your system to the following package versions:<\/p>\n<dl>\n<dt>Ubuntu 17.10<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/intel-microcode\">intel-microcode<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/intel-microcode\/3.20180312.0~ubuntu17.10.1\">3.20180312.0~ubuntu17.10.1<\/a><\/dd>\n<dt>Ubuntu 16.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/intel-microcode\">intel-microcode<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/intel-microcode\/3.20180312.0~ubuntu16.04.1\">3.20180312.0~ubuntu16.04.1<\/a><\/dd>\n<dt>Ubuntu 14.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/intel-microcode\">intel-microcode<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/intel-microcode\/3.20180312.0~ubuntu14.04.1\">3.20180312.0~ubuntu14.04.1<\/a><\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions: <a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.<\/p>\n<p>After a standard system update you need to reboot your computer to make<br \/>\nall the necessary changes.<\/p>\n<h2 id=\"references\">References<\/h2>\n<ul>\n<li><a href=\"https:\/\/usn.ubuntu.com\/usn\/usn-3531-1\">USN-3531-1<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-5715\">CVE-2017-5715<\/a><\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/usn.ubuntu.com\/3531-3\/\" target=\"_blank\">USN-3531-3: intel-microcode update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3531-3: intel-microcode update intel-microcode update A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary The system could be made to expose sensitive information. Software Description intel-microcode &#8211; Processor microcode for Intel CPUs Details Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715) This update provides the corrected microcode updates required for the corresponding Linux kernel updates. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 17.10 intel-microcode &#8211; 3.20180312.0~ubuntu17.10.1 Ubuntu 16.04 LTS intel-microcode &#8211; 3.20180312.0~ubuntu16.04.1 Ubuntu 14.04 LTS intel-microcode &#8211; 3.20180312.0~ubuntu14.04.1 To update your system, please follow these instructions: https:\/\/wiki.ubuntu.com\/Security\/Upgrades. After <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3531-3-intel-microcode-update\/\" title=\"USN-3531-3: intel-microcode update\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-23242","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/23242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=23242"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/23242\/revisions"}],"predecessor-version":[{"id":23243,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/23242\/revisions\/23243"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=23242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=23242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=23242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}