Advisory Published
Advisory Published

RHSA-2020:2432: Moderate: microcode_ctl security, bug fix and enhancement update

First published: Tue Jun 09 2020(Updated: )

Security Fix(es):<br><li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> Update Intel CPU microcode to microcode-20200602 release, addresses:</li> <li> Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f</li> up to 0x621;<br><li> Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718</li> up to 0x71a;<br><li> Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;</li> <li> Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e</li> up to 0x2f;<br><li> Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25</li> up to 0x26;<br><li> Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;</li> <li> Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21</li> up to 0x22;<br><li> Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6</li> up to 0xdc;<br><li> Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151</li> up to 0x1000157;<br><li> Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode</li> (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065<br> up to 0x2006906;<br><li> Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c</li> up to 0x4002f01;<br><li> Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c</li> up to 0x5002f01;<br><li> Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6</li> up to 0xdc;<br><li> Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46</li> up to 0x78;<br><li> Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca</li> up to 0xd6;<br><li> Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca</li> up to 0xd6;<br><li> Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca</li> up to 0xd6;<br><li> Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca</li> up to 0xd6;<br><li> Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode</li> from revision 0xca up to 0xd6;<br><li> Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision</li> 0xca up to 0xd6;<br><li> Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca</li> up to 0xd6;<br><li> Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;</li> <li> Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca</li> up to 0xd6;<br><li> Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.</li> <li> Change the URL in the intel-microcode2ucode.8 to point to the GitHub</li> repository since the microcode download section at Intel Download Center<br> does not exist anymore.<br><li> Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment</li> models.<br><li> Re-generate initramfs not only for the currently running kernel,</li> but for several recently installed kernels as well.<br><li> Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.</li> <li> Update stale posttrans dependency, add triggers for proper handling</li> of the debug kernel flavour along with kernel-rt.

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203