vulnerability

Ubuntu: (Multiple Advisories) (CVE-2018-12130): Intel Microcode update

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:C/I:N/A:N)
Published
05/14/2019
Added
05/15/2019
Modified
11/27/2024

Description

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Solution(s)

ubuntu-upgrade-intel-microcodeubuntu-upgrade-libvirt-binubuntu-upgrade-libvirt-clientsubuntu-upgrade-libvirt-daemonubuntu-upgrade-libvirt0ubuntu-upgrade-linux-image-3-13-0-170-genericubuntu-upgrade-linux-image-3-13-0-170-generic-lpaeubuntu-upgrade-linux-image-3-13-0-170-lowlatencyubuntu-upgrade-linux-image-3-13-0-170-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-170-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-170-powerpc-smpubuntu-upgrade-linux-image-3-13-0-170-powerpc64-embubuntu-upgrade-linux-image-3-13-0-170-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-140-genericubuntu-upgrade-linux-image-3-2-0-140-generic-paeubuntu-upgrade-linux-image-3-2-0-140-highbankubuntu-upgrade-linux-image-3-2-0-140-omapubuntu-upgrade-linux-image-3-2-0-140-powerpc-smpubuntu-upgrade-linux-image-3-2-0-140-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-140-virtualubuntu-upgrade-linux-image-4-15-0-1013-oracleubuntu-upgrade-linux-image-4-15-0-1032-gcpubuntu-upgrade-linux-image-4-15-0-1034-kvmubuntu-upgrade-linux-image-4-15-0-1036-raspi2ubuntu-upgrade-linux-image-4-15-0-1038-oemubuntu-upgrade-linux-image-4-15-0-1039-awsubuntu-upgrade-linux-image-4-15-0-1045-azureubuntu-upgrade-linux-image-4-15-0-1053-snapdragonubuntu-upgrade-linux-image-4-15-0-50-genericubuntu-upgrade-linux-image-4-15-0-50-generic-lpaeubuntu-upgrade-linux-image-4-15-0-50-lowlatencyubuntu-upgrade-linux-image-4-18-0-1011-gcpubuntu-upgrade-linux-image-4-18-0-1012-kvmubuntu-upgrade-linux-image-4-18-0-1014-raspi2ubuntu-upgrade-linux-image-4-18-0-1016-awsubuntu-upgrade-linux-image-4-18-0-1018-azureubuntu-upgrade-linux-image-4-18-0-20-genericubuntu-upgrade-linux-image-4-18-0-20-generic-lpaeubuntu-upgrade-linux-image-4-18-0-20-lowlatencyubuntu-upgrade-linux-image-4-18-0-20-snapdragonubuntu-upgrade-linux-image-4-4-0-1046-kvmubuntu-upgrade-linux-image-4-4-0-1083-awsubuntu-upgrade-linux-image-4-4-0-1109-raspi2ubuntu-upgrade-linux-image-4-4-0-1113-snapdragonubuntu-upgrade-linux-image-4-4-0-148-genericubuntu-upgrade-linux-image-4-4-0-148-generic-lpaeubuntu-upgrade-linux-image-4-4-0-148-lowlatencyubuntu-upgrade-linux-image-4-4-0-148-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-148-powerpc-smpubuntu-upgrade-linux-image-4-4-0-148-powerpc64-embubuntu-upgrade-linux-image-4-4-0-148-powerpc64-smpubuntu-upgrade-linux-image-5-0-0-1006-awsubuntu-upgrade-linux-image-5-0-0-1006-azureubuntu-upgrade-linux-image-5-0-0-1006-gcpubuntu-upgrade-linux-image-5-0-0-1006-kvmubuntu-upgrade-linux-image-5-0-0-1008-raspi2ubuntu-upgrade-linux-image-5-0-0-15-genericubuntu-upgrade-linux-image-5-0-0-15-generic-lpaeubuntu-upgrade-linux-image-5-0-0-15-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpcubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-lts-xenialubuntu-upgrade-qemuubuntu-upgrade-qemu-system-x86
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.