Packages
- amd64-microcode - Processor microcode firmware for AMD CPUs
Details
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
23.04 lunar | amd64-microcode – 3.20220411.1ubuntu3.2 | ||
22.04 jammy | amd64-microcode – 3.20191218.1ubuntu2.2 | ||
20.04 focal | amd64-microcode – 3.20191218.1ubuntu1.2 | ||
18.04 bionic | amd64-microcode – 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm2 | ||
16.04 xenial | amd64-microcode – 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm2 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.