Revision Date: | 2021-08-09 | Version: | 636 |
Title: | RHSA-2021:3028: microcode_ctl security, bug fix and enhancement update (Important) |
Description: | The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
hw: Vector Register Data Sampling (CVE-2020-0548)
hw: L1D Cache Eviction Sampling (CVE-2020-0549)
hw: vt-d related privilege escalation (CVE-2020-24489)
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
hw: Vector Register Leakage-Active (CVE-2020-8696)
hw: Fast forward store predictor (CVE-2020-8698)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 RHSA-2021:3028
|
Platform(s): | Red Hat Enterprise Linux 7
| Product(s): | |
Definition Synopsis |
Red Hat Enterprise Linux must be installed OR Package Information
Red Hat Enterprise Linux 7 is installed
AND microcode_ctl is earlier than 2:2.1-73.11.el7_9
AND microcode_ctl is signed with Red Hat redhatrelease2 key
|