Ubuntu updates to mitigate new Microarchitectural Data Sampling (MDS) vulnerabilities
Alex Murray
on 14 May 2019
Tags: 14.04 , 16.04 , 18.04 , ESM , Extended Security Maintenance , Intel , mds , Security , Trusty Tahr

Microarchitectural Data Sampling (MDS) describes a group of vulnerabilities (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091) in various Intel microprocessors, which allow a malicious process to read various information from another process which is executing on the same CPU core. This occurs due to the use of various microarchitectural elements (buffers) within the CPU core. If one process is able to speculatively sample data from these buffers, it can infer their contents and read data belonging to another process since these buffers are not cleared when switching between processes. This includes switching between two different userspace processes, switching between kernel and userspace and switching between the host and a guest when using virtualisation.
In the case of a single process being scheduled to a single CPU thread, it is relatively simple to mitigate this vulnerability by clearing these buffers when scheduling a new process onto the CPU thread. To achieve this, Intel have released an updated microcode which combined with changes to the Linux kernel ensure these buffers are appropriately cleared.
Updated versions of the intel-microcode, qemu and linux kernel packages are being published as part of the standard Ubuntu security maintenance of Ubuntu releases 16.04 LTS, 18.04 LTS, 18.10, 19.04 and as part of the extended security maintenance for Ubuntu 14.04 ESM users. As these vulnerabilities affect such a large range of Intel processors (across laptop, desktop and server machines), a large percentage of Ubuntu users are expected to be impacted – users are encouraged to install these updated packages as soon as they become available.
The use of Symmetric Multi-Threading (SMT) – also known as Hyper-Threading – further complicates these issues since these buffers are shared between sibling Hyper-Threads. Therefore, the above changes are not sufficient to mitigate these vulnerabilities when SMT is enabled. As such, the use of SMT is not recommended when untrusted code or applications are being executed.
For further details, including the specific package versions that mitigate these vulnerablities and instructions for optionally disabling SMT, please consult this article within the Ubuntu Security Knowledge Base.
Ubuntu 18.04 LTS has reached the end of standard support
Bionic Beaver reached the end of the standard, five-year maintenance window for Long-Term Support (LTS) releases on 31 May 2023. Migrate to the latest LTS or get extended coverage until 2028 with Ubuntu Pro.
Ubuntu 20.04 LTS has reached the end of Standard Support
Focal Fossa reached the end of the standard, five-year maintenance window for Long Term Support (LTS) releases on May 31, 2025. Migrate to the latest LTS or get extended coverage until 2030 with Ubuntu Pro.
Newsletter signup
Related posts
Ubuntu Pro Minimal 22.04 LTS with CIS hardening is now generally available on AWS
August 28, 2025 – We are excited to announce the general availability of Ubuntu Pro Minimal 22.04 LTS with CIS hardening, a new variant of Ubuntu designed for...
Generating allow-lists with DNS monitoring on LXD
Allow-listing web traffic – blocking all web traffic that has not been pre-approved – is a common practice in highly sensitive environments. It is also a...
A complete security view for every Ubuntu LTS VM on Azure
Azure’s Update Manager now provides a complete security view for all Ubuntu LTS VMs—18.04, 20.04, 22.04, and 24.04—by showing available updates from Ubuntu...