- Issued:
- 2021-06-08
- Updated:
- 2021-06-08
RHSA-2021:2308 - Security Advisory
Synopsis
Important: microcode_ctl security, bug fix and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
- hw: vt-d related privilege escalation (CVE-2020-24489)
- hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
- hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
- hw: information disclosure on some Intel Atom processors (CVE-2020-24513)
Bug Fix(es) and Enhancement(s):
- Update Intel CPU microcode to microcode-20210525 release
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation
- BZ - 1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors
- BZ - 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors
- BZ - 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux Server - AUS 8.6
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux Server - AUS 8.4
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux Server - TUS 8.6
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux Server - TUS 8.4
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
microcode_ctl-20210216-1.20210525.1.el8_4.src.rpm | SHA-256: 3aba36287d2958f49991c92a3f3d5bb173783f8144e555a792bf8bf7f53eb9ed |
x86_64 | |
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm | SHA-256: 44bccebd801a24fbdb4cb69ec74a0aed98e47786d27e72d6c39848a69a819c2b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.