8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
17.1%
CentOS Errata and Security Advisory CESA-2021:3028
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
hw: Vector Register Data Sampling (CVE-2020-0548)
hw: L1D Cache Eviction Sampling (CVE-2020-0549)
hw: vt-d related privilege escalation (CVE-2020-24489)
hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
hw: Vector Register Leakage-Active (CVE-2020-8696)
hw: Fast forward store predictor (CVE-2020-8698)
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2021-August/086138.html
Affected packages:
microcode_ctl
Upstream details at:
https://access.redhat.com/errata/RHSA-2021:3028
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | microcode_ctl | < 2.1-73.11.el7_9 | microcode_ctl-2.1-73.11.el7_9.x86_64.rpm |
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
17.1%