Advisory Published

RHSA-2020:5181: Moderate: microcode_ctl security, bug fix and enhancement update

First published: Mon Nov 23 2020(Updated: )

The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)</li> <li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li> Bug Fix(es) and Enhancement(s):<br><li> Update Intel CPU microcode to microcode-20201112 release, addresses:</li> <li> Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;</li> <li> Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;</li> <li> Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;</li> <li> Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;</li> <li> Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;</li> <li> Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;</li> <li> Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision</li> 0xe0;<br><li> Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in</li> intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;<br><li> Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in</li> intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up<br> to 0x2006a08;<br><li> Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in</li> intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;<br><li> Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up<br> to 0xe0;<br><li> Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)</li> microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from<br> revision 0xd6 up to 0xde;<br><li> Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode</li> from revision 0x43 up to 0x44;<br><li> Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157</li> up to 0x1000159;<br><li> Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01</li> up to 0x4003003;<br><li> Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision</li> 0x5002f01 up to 0x5003003;<br><li> Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up</li> to 0x40;<br><li> Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up</li> to 0x1e;<br><li> Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up</li> to 0x34;<br><li> Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up</li> to 0x18;<br><li> Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78</li> up to 0xa0;<br><li> Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca</li> up to 0xe0.<br><li> Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.</li> <li> Add README file to the documentation directory.</li> <li> Add publicly-sourced codenames list to supply to gen_provides.sh; update</li> the latter to handle the somewhat different format.<br><li> Add SUMMARY.intel-ucode file</li>

Affected SoftwareAffected VersionHow to fix
Microcode

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of RHSA-2020:5181?

    The severity of RHSA-2020:5181 is considered high due to multiple significant vulnerabilities in Intel hardware.

  • How do I fix RHSA-2020:5181?

    To fix RHSA-2020:5181, install the latest microcode_ctl package updates provided by your system vendor.

  • What vulnerabilities are addressed in RHSA-2020:5181?

    RHSA-2020:5181 addresses CVE-2020-8695 and CVE-2020-8696, which involve information disclosure and vector register leakage respectively.

  • What products are affected by RHSA-2020:5181?

    RHSA-2020:5181 affects systems using Intel processors that rely on the microcode_ctl package.

  • Is RHSA-2020:5181 applicable to all Intel processors?

    No, RHSA-2020:5181 is specific to certain Intel processors that are susceptible to the disclosed vulnerabilities.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203