Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting our team. We will be in touch shortly.Close

  1. Blog
  2. Article

Canonical
on 14 August 2018

Ubuntu updates for L1 Terminal Fault vulnerabilities


  • For up-to-date patch, package, and USN links, please click here

Today Intel announced a new side channel vulnerability known as L1 Terminal Fault. Raoul Strackx, Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and researchers from Intel discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that’s executing on the CPU core. Processors from other vendors are not known to be affected by L1TF.

Three CVEs have been assigned to this issue:

* CVE-2018-3615 for Intel Software Guard Extensions (Intel SGX)

* CVE-2018-3620 for operating systems and System Management Mode (SMM)

* CVE-2018-3646 for impacts to virtualization

For technical details regarding this issue, please refer to the L1TF KnowledgeBase articlethe Linux kernel documentation, and the L1TF Mitigation guidance published by Intel.

Hardware OEMs are releasing BIOS updates containing the updated Intel microcode. Check with your OEM’s website to see if a BIOS update is available for your machine. Ubuntu updates for the intel-microcode package are also being made available. Microcode updates are not required for this issue due to a software fallback mode present in the Ubuntu kernel updates.

Kernel updates are being released for the following supported Ubuntu series:

    • 18.04 LTS (Bionic)
    • 16.04 LTS (Xenial)
    • 14.04 LTS (Trusty)
  • 12.04 ESM (Precise)

Optimised kernels based on any of the above series were also released, including linux-aws, linux-azure, linux-gcp, and hardware enablement kernels. Updated cloud images have also been built and published to ensure a consistent Ubuntu experience.

Updated Ubuntu kernels have the ability to report how the system is currently affected by L1TF. To check your system, read the contents of the

/sys/devices/system/cpu/vulnerabilities/l1tf

file. You must apply kernel updates and reboot if the file does not exist as that indicates that your kernel does not have mitigations in place for L1TF.

Processors that aren’t vulnerable to L1TF will report the following:

$ cat /sys/devices/system/cpu/vulnerabilities/l1tf

Not affected

The file will contain the following contents for processors that do not support Intel Hyper-Threading or where Hyper-Threading has been disabled:

$ cat /sys/devices/system/cpu/vulnerabilities/l1tf

Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled

Processors that have Hyper-Threading support enabled will indicate that SMT is vulnerable when used in conjunction with Intel Virtualization Technology (VMX):

$ cat /sys/devices/system/cpu/vulnerabilities/l1tf

Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable

Intel processors that lack VMX support will not report VMX status:

$ cat /sys/devices/system/cpu/vulnerabilities/l1tf

Mitigation: PTE Inversion

We recommend that you apply available updates at your earliest convenience. We encourage Ubuntu users who seek more information to contact an Ubuntu Advantage support representative for an in-depth discussion relative to your use cases.

Related posts


Lech Sandecki
3 October 2023

Zenbleed vulnerability fix for Ubuntu

Cloud and server Article

On 24 July 2023, security researchers from Google’s Information Security Engineering team disclosed a hardware vulnerability affecting AMD’s Zen 2 family of microprocessors. They dubbed this vulnerability “Zenbleed” (CVE-2023-20593), evoking memories of previous vulnerabilities like HeartBleed and hinting at its possible impact. In respon ...


Canonical
14 December 2023

Canonical and Intel’s strategic collaboration brings you confidential computing with Intel® TDX on Ubuntu

Canonical announcements Article

Ensuring data security at run-time has long been an open computing challenge and a tough problem to solve. This gap arises because data must be decrypted in system memory for processing, even when it is stored encrypted. This exposes it to a large attack surface of threats posed by potentially malicious system software, such as ...


Michael Hudson-Doyle
12 December 2023

Optimising Ubuntu performance on amd64 architecture

Ubuntu Article

Everyone wants the Linux distribution they are using to be fast. This is practically a content-free statement, of course: who would want their distro to be slow? But at the same time, what does it mean for your distribution to be fast? For example, Ubuntu 21.10 switched the default compression for packages to zstd, which ...