UbuntuUpdates.org

Package "amd64-microcode"


Moved to xenial:multiverse:base


Name: amd64-microcode

Description:

Processor microcode firmware for AMD CPUs

Latest version: *DELETED*
Release: xenial (16.04)
Level: updates
Repository: multiverse

Links


Download "amd64-microcode"


Other versions of "amd64-microcode" in Xenial

Repository Area Version
base multiverse 2.20160316.1
security main 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2
updates main 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2

Changelog

Version: *DELETED* 2018-01-09 21:06:56 UTC
Moved to xenial:multiverse:base
No changelog for deleted or moved packages.

Version: 2.20160316.1 2018-01-04 22:06:41 UTC

  amd64-microcode (2.20160316.1) unstable; urgency=critical

  * Upstream release 20160316 built from linux-firmware:
    + Updated Microcodes:
      sig 0x00600f20, patch id 0x0600084f, 2016-01-25
    + This microcode updates fixes a critical erratum on NMI handling
      introduced by microcode patch id 0x6000832 from the 20141028 update.
      The erratum is also present on microcode patch id 0x6000836.
    + THIS IS A CRITICAL STABILITY AND SECURITY UPDATE FOR THE EARLIER
      AMD PILEDRIVER PROCESSORS, including:
      + AMD Opteron 3300, 4300, 6300
      + AMD FX "Vishera" (43xx, 63xx, 83xx, 93xx, 95xx)
      + AMD processors with family 21, model 2, stepping 0
  * Robert Święcki, while fuzzing the kernel using the syzkaller tool,
    uncovered very strange behavior on an AMD FX-8320, later reproduced on
    other AMD Piledriver model 2, stepping 0 processors including the Opteron
    6300. Robert discovered, using his proof-of-concept exploit code, that
    the incorrect behavior allows an unpriviledged attacker on an unpriviledged
    VM to corrupt the return stack of the host kernel's NMI handler. At best,
    this results in unpredictable host behavior. At worst, it allows for an
    unpriviledged user on unpriviledged VM to carry a sucessful host-kernel
    ring 0 code injection attack.
  * The erratum is timing-dependant, easily triggered by workloads that cause
    a high number of NMIs, such as running the "perf" tool.

 -- Henrique de Moraes Holschuh <email address hidden> Sat, 19 Mar 2016 14:02:44 -0300




About   -   Send Feedback to @ubuntu_updates