First published: Tue Jun 08 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)</li> <li> hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)</li> <li> hw: information disclosure on some Intel Atom processors (CVE-2020-24513)</li> Bug Fix(es) and Enhancement(s):<br><li> Update Intel CPU microcode to microcode-20210525 release</li>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:2303 has been rated as critical due to the potential for privilege escalation and improper isolation vulnerabilities.
To fix RHSA-2021:2303, update the microcode_ctl packages to the latest version provided by your vendor.
RHSA-2021:2303 addresses vulnerabilities including CVE-2020-24489 and CVE-2020-24511 which can lead to privilege escalation.
RHSA-2021:2303 is specifically applicable to certain Intel processors that are affected by the reported vulnerabilities.
Failing to patch RHSA-2021:2303 can lead to exploitable vulnerabilities that may allow attackers to escalate privileges or access sensitive data.