Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : intel-microcode vulnerabilities (USN-3756-1) (Foreshadow) (Spectre)
Medium Nessus Plugin ID 112151
SynopsisThe remote Ubuntu host is missing a security-related patch.
DescriptionIt was discovered that memory present in the L1 data cache of an Intel
CPU core may be exposed to a malicious process that is executing on
the CPU core. This vulnerability is also known as L1 Terminal Fault
(L1TF). A local attacker in a guest virtual machine could use this to
expose sensitive information (memory from other guests or the host
Jann Horn and Ken Johnson discovered that microprocessors utilizing
speculative execution of a memory read may allow unauthorized memory
reads via a sidechannel attack. This flaw is known as Spectre Variant
4. A local attacker could use this to expose sensitive information,
including kernel memory. (CVE-2018-3639)
Zdenek Sojka, Rudolf Marek, Alex Zuepke, and Innokentiy Sennovskiy
discovered that microprocessors that perform speculative reads of
system registers may allow unauthorized disclosure of system
parameters via a sidechannel attack. This vulnerability is also known
as Rogue System Register Read (RSRE). An attacker could use this to
expose sensitive information. (CVE-2018-3640).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
SolutionUpdate the affected intel-microcode package.