First published: Tue Aug 17 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fixes:<br><li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)</li> <li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li> <li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)</li> <li> hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)</li> Bug Fix(es):<br><li> [rhel-8.1.0.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates (BZ#1972327)</li> <li> [rhel-8.1.0.z] Re-enable 06-8c-01 (TGL-UP3/UP4, CPUID 0x806c1) latest microcode updates (BZ#1972331)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Microcode |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3176 is categorized as a security vulnerability that addresses critical hardware vulnerabilities affecting Intel microcode.
To fix RHSA-2021:3176, update the microcode_ctl package to the latest version provided by your Linux distribution.
RHSA-2021:3176 addresses vulnerabilities including CVE-2020-0548, CVE-2020-0549, and CVE-2020-0543.
RHSA-2021:3176 can potentially allow attackers to exploit hardware vulnerabilities in Intel processors, leading to data leakage.
Systems using affected versions of Intel processors with unpatched microcode are at risk from RHSA-2021:3176.