If you use Ubuntu or any of its official flavors, surely you have one or more pending updates. Canonical has published several security reports that list various vulnerabilities. The first of these affect several of Intel's microarchitectures and their associated GPUs. In total, 4 vulnerabilities have been fixed in intel microcode: the TSX Asynchronous Abort (CVE-2019-11135), the Intel Processor Machine Check Error (CVE-2018-12207) and known as Intel i915 graphics hardware vulnerabilities (CVE-2019-0155 y CVE-2019-0154). Three of the above failures are marked as high priority.
As we read in the reports USN-4182-1 y USN-4182-2, the operating systems affected by these vulnerabilities in Intel Microcode are all versions based on Ubuntu that enjoy official support and Ubuntu 14.04, in this case because they are in the ESM phase. The rest of the vulnerabilities that they have corrected are already related buggy in kernel Canonical's operating system.
Fixed three high priority vulnerabilities in Intel Microcode
Regarding the kernel, Canonical has published 4 security reports: the USN-4183-1 describe 9 vulnerabilities in the Ubunutu kernel 19.10, USN-4185-1 tells us about 11 vulnerabilities in Ubuntu 18.04 and Ubuntu 16.04, the USN-4186-1 makes it 12 on Ubuntu 16.04 and the USN-4187-1 mentions another vulnerability in Ubuntu 14.04. Many of the vulnerabilities are present in various versions of Ubuntu and while most are of medium priority, there are some of high priority.
As usual, Canonical has released the security reports when bug fixes are now available. This means that to protect ourselves from bugs in Intel Microcode and other vulnerabilities in the Ubuntu kernel, we just have to open our software center or Software Update app and apply the new packages that are already waiting for us. For the changes to take effect, the computer will need to be restarted.