First published: Tue Jun 08 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)</li> <li> hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)</li> <li> hw: information disclosure on some Intel Atom processors (CVE-2020-24513)</li> Bug Fix(es) and Enhancement(s):<br><li> Update Intel CPU microcode to microcode-20210525 release</li> <li> Do not use "grep -q" in a pipe in check_caveats.</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:2299 addresses multiple vulnerabilities in the microcode_ctl packages, which can significantly impact system security.
To fix RHSA-2021:2299, update the microcode_ctl packages to the latest version provided by your Linux distribution.
RHSA-2021:2299 addresses vulnerabilities related to privilege escalation (CVE-2020-24489) and improper isolation of shared resources (CVE-2020-24511) in Intel processors.
RHSA-2021:2299 affects systems using vulnerable Intel processors that rely on the microcode_ctl package for updates.
It is not safe to ignore the updates for RHSA-2021:2299 as they address critical vulnerabilities that can lead to data breaches and unauthorized access.