Lucene search

K
ubuntuUbuntuUSN-4628-3
HistoryMay 17, 2021 - 12:00 a.m.

Intel Microcode vulnerabilities

2021-05-1700:00:00
ubuntu.com
166

6.1 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.9%

Releases

  • Ubuntu 21.04
  • Ubuntu 20.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • intel-microcode - Processor microcode for Intel CPUs

Details

USN-4628-1 provided updated Intel Processor Microcode for various processor
types. This update provides the corresponding updates for some additional
processor types.

Original advisory details:

Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine
Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running
Average Power Limit (RAPL) feature of some Intel processors allowed a side-
channel attack based on power consumption measurements. A local attacker
could possibly use this to expose sensitive information. (CVE-2020-8695)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that
some Intel® Processors did not properly remove sensitive information
before storage or transfer in some situations. A local attacker could
possibly use this to expose sensitive information. (CVE-2020-8696)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that
some Intel® Processors did not properly isolate shared resources in some
situations. A local attacker could possibly use this to expose sensitive
information. (CVE-2020-8698)

OSVersionArchitecturePackageVersionFilename
Ubuntu21.04noarchintel-microcode< 3.20210216.0ubuntu0.21.04.1UNKNOWN
Ubuntu20.10noarchintel-microcode< 3.20210216.0ubuntu0.20.10.1UNKNOWN
Ubuntu20.04noarchintel-microcode< 3.20210216.0ubuntu0.20.04.1UNKNOWN
Ubuntu18.04noarchintel-microcode< 3.20210216.0ubuntu0.18.04.1UNKNOWN