SUSE-SU-2021:14758-1: important: Security update for microcode_ctl

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Jun 28 16:16:44 UTC 2021


   SUSE Security Update: Security update for microcode_ctl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:14758-1
Rating:             important
References:         #1179833 #1179836 #1179837 #1179839 
Cross-References:   CVE-2020-24489 CVE-2020-24511 CVE-2020-24512
                    CVE-2020-24513
CVSS scores:
                    CVE-2020-24489 (SUSE): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
                    CVE-2020-24511 (SUSE): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2020-24512 (SUSE): 2.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
                    CVE-2020-24513 (SUSE): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for microcode_ctl fixes the following issues:

   Updated to Intel CPU Microcode 20210525 release:

   - CVE-2020-24513: A domain bypass transient execution vulnerability was
     discovered on some Intel Atom processors that use a micro-architectural
     incident channel. (bsc#1179833)
   - CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient
     execution side channel vulnerabilities may not fully prevent non-root
     (guest) branches from controlling the branch predictions of the root
     (host) (bsc#1179836)
   - CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero
     value cache-lines may lead to changes in cache-allocation or write-back
     behavior for such cache-lines (bsc#1179837)
   - CVE-2020-24489: Fixed Intel VT-d device pass through potential local
     privilege escalation (bsc#1179839)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-microcode_ctl-14758=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-microcode_ctl-14758=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):

      microcode_ctl-1.17-102.83.71.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      microcode_ctl-1.17-102.83.71.1


References:

   https://www.suse.com/security/cve/CVE-2020-24489.html
   https://www.suse.com/security/cve/CVE-2020-24511.html
   https://www.suse.com/security/cve/CVE-2020-24512.html
   https://www.suse.com/security/cve/CVE-2020-24513.html
   https://bugzilla.suse.com/1179833
   https://bugzilla.suse.com/1179836
   https://bugzilla.suse.com/1179837
   https://bugzilla.suse.com/1179839



More information about the sle-security-updates mailing list