First published: Tue Aug 31 2021(Updated: )
The microcode_ctl packages provide microcode updates for Intel.<br>Security Fix(es):<br><li> hw: Vector Register Data Sampling (CVE-2020-0548)</li> <li> hw: L1D Cache Eviction Sampling (CVE-2020-0549)</li> <li> hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)</li> <li> hw: Information disclosure issue in Intel SGX via RAPL interface</li> (CVE-2020-8695)<br><li> hw: Vector Register Leakage-Active (CVE-2020-8696)</li> <li> hw: Fast forward store predictor (CVE-2020-8698)</li> <li> hw: vt-d related privilege escalation (CVE-2020-24489)</li> <li> hw: improper isolation of shared resources in some Intel Processors</li> (CVE-2020-24511)<br><li> hw: observable timing discrepancy in some Intel Processors</li> (CVE-2020-24512)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3322 is classified as important.
To fix RHSA-2021:3322, you must update the microcode_ctl package to the latest version provided by your distribution.
RHSA-2021:3322 addresses several vulnerabilities including CVE-2020-0548, CVE-2020-0549, and CVE-2020-0543.
RHSA-2021:3322 is applicable to systems using Intel processors that require microcode updates.
If RHSA-2021:3322 is not applied, your system may remain vulnerable to exploits related to data sampling attacks on Intel architectures.