Today Intel announced a new side channel vulnerability known as L1 Terminal Fault. Raoul Strackx, Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and researchers from Intel discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that’s executing on the CPU core. Processors from other vendors are not known to be affected by L1TF.
Three CVEs have been assigned to this issue:
* CVE-2018-3615 for Intel Software Guard Extensions (Intel SGX)
* CVE-2018-3620 for operating systems and System Management Mode (SMM)
* CVE-2018-3646 for impacts to virtualization
Hardware OEMs are releasing BIOS updates containing the updated Intel microcode. Check with your OEM’s website to see if a BIOS update is available for your machine. Ubuntu updates for the intel-microcode package are also being made available. Microcode updates are not required for this issue due to a software fallback mode present in the Ubuntu kernel updates.
Kernel updates are being released for the following supported Ubuntu series:
Optimised kernels based on any of the above series were also released, including linux-aws, linux-azure, linux-gcp, and hardware enablement kernels. Updated cloud images have also been built and published to ensure a consistent Ubuntu experience.
Updated Ubuntu kernels have the ability to report how the system is currently affected by L1TF. To check your system, read the contents of the
file. You must apply kernel updates and reboot if the file does not exist as that indicates that your kernel does not have mitigations in place for L1TF.
Processors that aren’t vulnerable to L1TF will report the following:
$ cat /sys/devices/system/cpu/vulnerabilities/l1tf Not affected
The file will contain the following contents for processors that do not support Intel Hyper-Threading or where Hyper-Threading has been disabled:
$ cat /sys/devices/system/cpu/vulnerabilities/l1tf Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
Processors that have Hyper-Threading support enabled will indicate that SMT is vulnerable when used in conjunction with Intel Virtualization Technology (VMX):
$ cat /sys/devices/system/cpu/vulnerabilities/l1tf Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Intel processors that lack VMX support will not report VMX status:
$ cat /sys/devices/system/cpu/vulnerabilities/l1tf Mitigation: PTE Inversion
We recommend that you apply available updates at your earliest convenience. We encourage Ubuntu users who seek more information to contact an Ubuntu Advantage support representative for an in-depth discussion relative to your use cases.
Interested in running Ubuntu Desktop in your organisation?
Quite often, security and functionality are two opposing forces. Vendors are trapped in a zero-sum game between providing their users as much freedom in the software they use and limiting said freedom to create tightly controlled and…
Charmed distribution of Kubernetes clusters auto-apply vulnerability patches for CVE-2018-1002105 On December 3 2018, the Kubernetes project disclosed a security vulnerability in all versions of its popular container orchestration…
Security, regulations and compliance are everyday issues for businesses, whether global or not. HIPAA, GDPR, MiFID II, and a whole host of other regulations, security and compliance demands are shaping the way businesses operate and the…