Advisory Published
Advisory Published

RHSA-2020:5182: Moderate: microcode_ctl security, bug fix and enhancement update

First published: Mon Nov 23 2020(Updated: )

The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)</li> <li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li> Bug Fix(es) and Enhancement(s):<br><li> Update Intel CPU microcode to microcode-20201112 release, addresses:</li> <li> Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;</li> <li> Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;</li> <li> Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;</li> <li> Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;</li> <li> Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;</li> <li> Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;</li> <li> Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision</li> 0xe0;<br><li> Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in</li> intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;<br><li> Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in</li> intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up<br> to 0x2006a08;<br><li> Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in</li> intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;<br><li> Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up<br> to 0xe0;<br><li> Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)</li> microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from<br> revision 0xd6 up to 0xde;<br><li> Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in</li> intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up<br> to 0xde;<br><li> Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode</li> from revision 0x43 up to 0x44;<br><li> Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157</li> up to 0x1000159;<br><li> Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01</li> up to 0x4003003;<br><li> Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision</li> 0x5002f01 up to 0x5003003;<br><li> Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up</li> to 0x40;<br><li> Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up</li> to 0x1e;<br><li> Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up</li> to 0x34;<br><li> Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up</li> to 0x18;<br><li> Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78</li> up to 0xa0;<br><li> Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca</li> up to 0xe0.<br><li> Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.</li> <li> Add README file to the documentation directory.</li> <li> Add publicly-sourced codenames list to supply to gen_provides.sh; update</li> the latter to handle the somewhat different format.<br><li> Add SUMMARY.intel-ucode file</li>

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203