First published: Mon Aug 09 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors</li> (CVE-2020-24511)<br><li> hw: observable timing discrepancy in some Intel Processors</li> (CVE-2020-24512)<br><li> hw: Information disclosure issue in Intel SGX via RAPL interface</li> (CVE-2020-8695)<br><li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:3028 addresses vulnerabilities related to Special Register Buffer Data Sampling (CVE-2020-0543), Vector Register Data Sampling (CVE-2020-0548), and L1D Cache Eviction Sampling (CVE-2020-0549).
The severity of RHSA-2021:3028 is categorized as critical due to the potential impact on confidential data exposure and side-channel attacks.
To fix RHSA-2021:3028, you should update the microcode_ctl package as provided in the advisory.
RHSA-2021:3028 affects systems running on Intel architecture that utilize the microcode_ctl package for updates.
Currently, there are no known workarounds for RHSA-2021:3028, so applying the update is recommended as soon as possible.