First published: Mon Aug 09 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors</li> (CVE-2020-24511)<br><li> hw: observable timing discrepancy in some Intel Processors</li> (CVE-2020-24512)<br><li> hw: Information disclosure issue in Intel SGX via RAPL interface</li> (CVE-2020-8695)<br><li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3027 is classified as important due to the potential impact on security.
To fix RHSA-2021:3027, update the microcode_ctl package to the latest version provided by Red Hat.
RHSA-2021:3027 addresses vulnerabilities including CVE-2020-0543, CVE-2020-0548, and CVE-2020-0549.
No, RHSA-2021:3027 is applicable only to certain Intel processors that are vulnerable to the specified issues.
Not applying RHSA-2021:3027 could leave systems exposed to security vulnerabilities that may allow data leakage.