USN-7077-1: AMD Microcode vulnerability

Publication date

21 October 2024

Overview

AMD processors may allow a privileged local attacker to further escalate their privileged and execute arbitrary code within the processor's firmware layer.


Packages

Details

Enrique Nissim and Krzysztof Okupski discovered that some AMD processors
did not properly restrict access to the System Management Mode (SMM)
configuration when the SMM Lock was enabled. A privileged local attacker
could possibly use this issue to further escalate their privileges and
execute arbitrary code within the processor's firmware layer.

Enrique Nissim and Krzysztof Okupski discovered that some AMD processors
did not properly restrict access to the System Management Mode (SMM)
configuration when the SMM Lock was enabled. A privileged local attacker
could possibly use this issue to further escalate their privileges and
execute arbitrary code within the processor's firmware layer.

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.10 oracular amd64-microcode –  3.20240116.2+nmu1ubuntu1.1
24.04 noble amd64-microcode –  3.20231019.1ubuntu2.1
22.04 jammy amd64-microcode –  3.20191218.1ubuntu2.3
20.04 focal amd64-microcode –  3.20191218.1ubuntu1.3
18.04 bionic amd64-microcode –  3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm3  
16.04 xenial amd64-microcode –  3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm3  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›