SUSE-SU-2021:14758-1: important: Security update for microcode_ctl
    sle-security-updates at lists.suse.com 
    sle-security-updates at lists.suse.com
       
    Mon Jun 28 16:16:44 UTC 2021
    
    
  
   SUSE Security Update: Security update for microcode_ctl
______________________________________________________________________________
Announcement ID:    SUSE-SU-2021:14758-1
Rating:             important
References:         #1179833 #1179836 #1179837 #1179839 
Cross-References:   CVE-2020-24489 CVE-2020-24511 CVE-2020-24512
                    CVE-2020-24513
CVSS scores:
                    CVE-2020-24489 (SUSE): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
                    CVE-2020-24511 (SUSE): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2020-24512 (SUSE): 2.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
                    CVE-2020-24513 (SUSE): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________
   An update that fixes four vulnerabilities is now available.
Description:
   This update for microcode_ctl fixes the following issues:
   Updated to Intel CPU Microcode 20210525 release:
   - CVE-2020-24513: A domain bypass transient execution vulnerability was
     discovered on some Intel Atom processors that use a micro-architectural
     incident channel. (bsc#1179833)
   - CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient
     execution side channel vulnerabilities may not fully prevent non-root
     (guest) branches from controlling the branch predictions of the root
     (host) (bsc#1179836)
   - CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero
     value cache-lines may lead to changes in cache-allocation or write-back
     behavior for such cache-lines (bsc#1179837)
   - CVE-2020-24489: Fixed Intel VT-d device pass through potential local
     privilege escalation (bsc#1179839)
Patch Instructions:
   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Server 11-SP4-LTSS:
      zypper in -t patch slessp4-microcode_ctl-14758=1
   - SUSE Linux Enterprise Point of Sale 11-SP3:
      zypper in -t patch sleposp3-microcode_ctl-14758=1
Package List:
   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):
      microcode_ctl-1.17-102.83.71.1
   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
      microcode_ctl-1.17-102.83.71.1
References:
   https://www.suse.com/security/cve/CVE-2020-24489.html
   https://www.suse.com/security/cve/CVE-2020-24511.html
   https://www.suse.com/security/cve/CVE-2020-24512.html
   https://www.suse.com/security/cve/CVE-2020-24513.html
   https://bugzilla.suse.com/1179833
   https://bugzilla.suse.com/1179836
   https://bugzilla.suse.com/1179837
   https://bugzilla.suse.com/1179839
    
    
More information about the sle-security-updates
mailing list