Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
{ "ubuntu_priority": "medium" }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm3", "binary_name": "amd64-microcode" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm3", "binary_name": "amd64-microcode" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.20191218.1ubuntu1.3", "binary_name": "amd64-microcode" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.20191218.1ubuntu2.3", "binary_name": "amd64-microcode" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.20240116.2+nmu1ubuntu1.1", "binary_name": "amd64-microcode" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.20231019.1ubuntu2.1", "binary_name": "amd64-microcode" } ] }