vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-12130): Intel Microcode update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:M/Au:N/C:C/I:N/A:N) | 05/14/2019 | 05/15/2019 | 11/27/2024 |
Severity
5
CVSS
(AV:L/AC:M/Au:N/C:C/I:N/A:N)
Published
05/14/2019
Added
05/15/2019
Modified
11/27/2024
Description
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Solution(s)
ubuntu-upgrade-intel-microcodeubuntu-upgrade-libvirt-binubuntu-upgrade-libvirt-clientsubuntu-upgrade-libvirt-daemonubuntu-upgrade-libvirt0ubuntu-upgrade-linux-image-3-13-0-170-genericubuntu-upgrade-linux-image-3-13-0-170-generic-lpaeubuntu-upgrade-linux-image-3-13-0-170-lowlatencyubuntu-upgrade-linux-image-3-13-0-170-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-170-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-170-powerpc-smpubuntu-upgrade-linux-image-3-13-0-170-powerpc64-embubuntu-upgrade-linux-image-3-13-0-170-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-140-genericubuntu-upgrade-linux-image-3-2-0-140-generic-paeubuntu-upgrade-linux-image-3-2-0-140-highbankubuntu-upgrade-linux-image-3-2-0-140-omapubuntu-upgrade-linux-image-3-2-0-140-powerpc-smpubuntu-upgrade-linux-image-3-2-0-140-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-140-virtualubuntu-upgrade-linux-image-4-15-0-1013-oracleubuntu-upgrade-linux-image-4-15-0-1032-gcpubuntu-upgrade-linux-image-4-15-0-1034-kvmubuntu-upgrade-linux-image-4-15-0-1036-raspi2ubuntu-upgrade-linux-image-4-15-0-1038-oemubuntu-upgrade-linux-image-4-15-0-1039-awsubuntu-upgrade-linux-image-4-15-0-1045-azureubuntu-upgrade-linux-image-4-15-0-1053-snapdragonubuntu-upgrade-linux-image-4-15-0-50-genericubuntu-upgrade-linux-image-4-15-0-50-generic-lpaeubuntu-upgrade-linux-image-4-15-0-50-lowlatencyubuntu-upgrade-linux-image-4-18-0-1011-gcpubuntu-upgrade-linux-image-4-18-0-1012-kvmubuntu-upgrade-linux-image-4-18-0-1014-raspi2ubuntu-upgrade-linux-image-4-18-0-1016-awsubuntu-upgrade-linux-image-4-18-0-1018-azureubuntu-upgrade-linux-image-4-18-0-20-genericubuntu-upgrade-linux-image-4-18-0-20-generic-lpaeubuntu-upgrade-linux-image-4-18-0-20-lowlatencyubuntu-upgrade-linux-image-4-18-0-20-snapdragonubuntu-upgrade-linux-image-4-4-0-1046-kvmubuntu-upgrade-linux-image-4-4-0-1083-awsubuntu-upgrade-linux-image-4-4-0-1109-raspi2ubuntu-upgrade-linux-image-4-4-0-1113-snapdragonubuntu-upgrade-linux-image-4-4-0-148-genericubuntu-upgrade-linux-image-4-4-0-148-generic-lpaeubuntu-upgrade-linux-image-4-4-0-148-lowlatencyubuntu-upgrade-linux-image-4-4-0-148-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-148-powerpc-smpubuntu-upgrade-linux-image-4-4-0-148-powerpc64-embubuntu-upgrade-linux-image-4-4-0-148-powerpc64-smpubuntu-upgrade-linux-image-5-0-0-1006-awsubuntu-upgrade-linux-image-5-0-0-1006-azureubuntu-upgrade-linux-image-5-0-0-1006-gcpubuntu-upgrade-linux-image-5-0-0-1006-kvmubuntu-upgrade-linux-image-5-0-0-1008-raspi2ubuntu-upgrade-linux-image-5-0-0-15-genericubuntu-upgrade-linux-image-5-0-0-15-generic-lpaeubuntu-upgrade-linux-image-5-0-0-15-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpcubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-lts-xenialubuntu-upgrade-qemuubuntu-upgrade-qemu-system-x86
References
- CVE-2018-12130
- https://attackerkb.com/topics/CVE-2018-12130
- DEBIAN-DSA-4602
- NVD-CVE-2018-12130
- UBUNTU-USN-3977-1
- UBUNTU-USN-3977-2
- UBUNTU-USN-3977-3
- UBUNTU-USN-3978-1
- UBUNTU-USN-3979-1
- UBUNTU-USN-3980-1
- UBUNTU-USN-3980-2
- UBUNTU-USN-3981-1
- UBUNTU-USN-3981-2
- UBUNTU-USN-3982-1
- UBUNTU-USN-3982-2
- UBUNTU-USN-3983-1
- UBUNTU-USN-3983-2
- UBUNTU-USN-3984-1
- UBUNTU-USN-3985-1
- UBUNTU-USN-3985-2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.