First published: Mon Aug 09 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)</li> <li> hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)</li> <li> hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)</li> <li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3029 is classified as critical due to serious hardware vulnerabilities.
To fix RHSA-2021:3029, update the microcode_ctl packages to the latest version provided by your distribution.
RHSA-2021:3029 addresses several vulnerabilities including CVE-2020-0543, CVE-2020-0548, and CVE-2020-0549.
RHSA-2021:3029 affects systems using Intel processors that require microcode updates.
Yes, a reboot is typically required after applying the microcode updates to ensure that all changes take effect.