First published: Tue Aug 31 2021(Updated: )
<li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: Information disclosure issue in Intel SGX via RAPL interface</li> (CVE-2020-8695)<br><li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li> <li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors</li> (CVE-2020-24511)<br><li> hw: observable timing discrepancy in some Intel Processors</li> (CVE-2020-24512)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Microcode |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:3317 is classified as a security vulnerability with potential for information disclosure.
To fix RHSA-2021:3317, you should apply the latest security patches provided by your operating system vendor.
RHSA-2021:3317 includes vulnerabilities related to vector register data sampling, L1D cache eviction sampling, and special register buffer data sampling.
Systems utilizing affected Intel processors may be impacted by RHSA-2021:3317.
Yes, users should enable relevant security features and keep their systems up to date to mitigate the risks associated with RHSA-2021:3317.