{"id":"USN-4628-2","summary":"intel-microcode regression","details":"USN-4628-1 provided updated Intel Processor Microcode. Unfortunately,\nthat update prevented certain processors in the Intel Tiger Lake family\nfrom booting successfully. This update reverts the microcode update for\nthe Tiger Lake processor family.\n\nPlease note that the 'dis_ucode_ldr' kernel command line option can be\nadded in the boot menu to disable microcode loading for system recovery.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine\n Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running\n Average Power Limit (RAPL) feature of some Intel processors allowed a side-\n channel attack based on power consumption measurements. A local attacker\n could possibly use this to expose sensitive information. (CVE-2020-8695)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly remove sensitive information\n before storage or transfer in some situations. A local attacker could\n possibly use this to expose sensitive information. (CVE-2020-8696)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly isolate shared resources in some\n situations. A local attacker could possibly use this to expose sensitive\n information. (CVE-2020-8698)\n","modified":"2026-02-10T04:41:58Z","published":"2020-11-12T01:14:30Z","related":["UBUNTU-CVE-2020-8695"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4628-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1903883"}],"affected":[{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20201110.0ubuntu0.14.04.2?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20201110.0ubuntu0.14.04.2"}]}],"versions":["1.20130906.1ubuntu2","1.20130906.1ubuntu3","2.20140122.1","2.20140430.1ubuntu1","2.20140624-t-1ubuntu2","3.20180108.0~ubuntu14.04.2","3.20180108.0+really20170707ubuntu14.04.1","3.20180312.0~ubuntu14.04.1","3.20180425.1~ubuntu0.14.04.1","3.20180425.1~ubuntu0.14.04.2","3.20180807a.0ubuntu0.14.04.1","3.20190514.0ubuntu0.14.04.1","3.20190514.0ubuntu0.14.04.2","3.20190618.0ubuntu0.14.04.1","3.20191112-0ubuntu0.14.04.2","3.20191115.1ubuntu0.14.04.1","3.20191115.1ubuntu0.14.04.2","3.20200609.0ubuntu0.14.04.0","3.20200609.0ubuntu0.14.04.1","3.20201110.0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.20201110.0ubuntu0.14.04.2","binary_name":"intel-microcode"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4628-2.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20201110.0ubuntu0.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20201110.0ubuntu0.16.04.2"}]}],"versions":["3.20150121.1","3.20151106.1","3.20170707.1~ubuntu16.04.0","3.20180108.0~ubuntu16.04.2","3.20180108.0+really20170707ubuntu16.04.1","3.20180312.0~ubuntu16.04.1","3.20180425.1~ubuntu0.16.04.1","3.20180425.1~ubuntu0.16.04.2","3.20180807a.0ubuntu0.16.04.1","3.20190514.0ubuntu0.16.04.1","3.20190514.0ubuntu0.16.04.2","3.20190618.0ubuntu0.16.04.1","3.20191112-0ubuntu0.16.04.2","3.20191115.1ubuntu0.16.04.1","3.20191115.1ubuntu0.16.04.2","3.20200609.0ubuntu0.16.04.0","3.20200609.0ubuntu0.16.04.1","3.20201110.0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.20201110.0ubuntu0.16.04.2","binary_name":"intel-microcode"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4628-2.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20201110.0ubuntu0.18.04.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20201110.0ubuntu0.18.04.2"}]}],"versions":["3.20170707.1","3.20171117.1","3.20180108.1","3.20180108.1+really20171117.1","3.20180312.0~ubuntu18.04.1","3.20180425.1~ubuntu0.18.04.1","3.20180425.1~ubuntu0.18.04.2","3.20180807a.0ubuntu0.18.04.1","3.20190514.0ubuntu0.18.04.2","3.20190514.0ubuntu0.18.04.3","3.20190618.0ubuntu0.18.04.1","3.20191112-0ubuntu0.18.04.2","3.20191115.1ubuntu0.18.04.1","3.20191115.1ubuntu0.18.04.2","3.20200609.0ubuntu0.18.04.0","3.20200609.0ubuntu0.18.04.1","3.20201110.0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.20201110.0ubuntu0.18.04.2","binary_name":"intel-microcode"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4628-2.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20201110.0ubuntu0.20.04.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20201110.0ubuntu0.20.04.2"}]}],"versions":["3.20190918.1ubuntu1","3.20191115.1ubuntu1","3.20191115.1ubuntu2","3.20191115.1ubuntu3","3.20200609.0ubuntu0.20.04.0","3.20200609.0ubuntu0.20.04.1","3.20200609.0ubuntu0.20.04.2","3.20201110.0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.20201110.0ubuntu0.20.04.2","binary_name":"intel-microcode"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4628-2.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.3"}