-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: microcode_ctl security, bug fix and enhancement update
Advisory ID:       RHSA-2021:2300-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2300
Issue date:        2021-06-08
CVE Names:         CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 
                   CVE-2020-24513 
====================================================================
1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux
7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.2) - x86_64

3. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

* hw: vt-d related privilege escalation (CVE-2020-24489)

* hw: improper isolation of shared resources in some Intel Processors(CVE-2020-24511)

* hw: observable timing discrepancy in some Intel Processors(CVE-2020-24512)

* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)

Bug Fix(es) and Enhancement(s):

* Update Intel CPU microcode to microcode-20210525 release

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1962650 - CVE-2020-24489 hw: vt-d related privilege escalation
1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
6. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.2):

Source:
microcode_ctl-2.1-12.37.el7_2.src.rpm

x86_64:
microcode_ctl-2.1-12.37.el7_2.x86_64.rpm
microcode_ctl-debuginfo-2.1-12.37.el7_2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-24489
https://access.redhat.com/security/cve/CVE-2020-24511
https://access.redhat.com/security/cve/CVE-2020-24512
https://access.redhat.com/security/cve/CVE-2020-24513
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYMATztzjgjWX9erEAQhNRA//dWSy153QpbPKOSo9s6SQPBw96PmyP7Th
GDERqK3CN+gLKzedncZ0XUp+NQO8NfzEEw8B7xu3QFmKE0r7yQEXud91BXH1HphX
9FeKCcNI0vdSLicpiqf6N8K90YuncA8H5NwVDMmCCWp8b9zs0GASutpg1cGnkrck
QGlntnaMoFqPSMDL3zBGv1/lZmSb8GP0rG8lY3zEZACABS7f2eWbTyo9b0Rgvxoy
rcv+HR2EXSXKFHiA0rFn5cjUQfOGI21Jp3OhDNCTd0C4N//sz39brYQfDq1hsa8x
dQY8YGmweOAKifGvxFToTgWgf9krNXiho5FSbHtHZ2CHxjFtha9lWT7irCBNOjNz
Xl4qtHxGYqNms2oSud5wfbRokHIyIuv3JdpjGukw7gm+GRpxPgqo0pAmErQThig4
YcIvtMEcuWEkWvptKv9Of81chFhiwEa3CkoC66I3zC69ELsFq/hqe5ToFWsHL+rk
OUEbADE3c2gxiZnSjcm72l0sPdICqbBZ+APnUB0AN1Gf1MTs4NBerZ57dvydocSv
ib/HtOzRV3EzWW2jV7rgease4dH12ZvSvdU3WHWzyj5n7k75TISiRrp/MZfW39Kl
oAU6s/z31DvxHBFBnCUEiH7JO31uloFsb9X3ZTFGFBuWOP16VwGkMX1I7Res9Pg8
bOeMGH8lKHQ=j/dX
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-2300:01 Important: microcode_ctl security,

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7

Summary

The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors(CVE-2020-24512)
* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20210525 release



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/cve/CVE-2020-24513 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux Server AUS (v. 7.2):
Source: microcode_ctl-2.1-12.37.el7_2.src.rpm
x86_64: microcode_ctl-2.1-12.37.el7_2.x86_64.rpm microcode_ctl-debuginfo-2.1-12.37.el7_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:2300-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2300
Issued Date: : 2021-06-08
CVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513

Topic

An update for microcode_ctl is now available for Red Hat Enterprise Linux7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Server AUS (v. 7.2) - x86_64


Bugs Fixed

1962650 - CVE-2020-24489 hw: vt-d related privilege escalation

1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors


Related News