4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
19.4%
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
hw: Vector Register Data Sampling (CVE-2020-0548)
hw: L1D Cache Eviction Sampling (CVE-2020-0549)
hw: vt-d related privilege escalation (CVE-2020-24489)
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
hw: Vector Register Leakage-Active (CVE-2020-8696)
hw: Fast forward store predictor (CVE-2020-8698)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | x86_64 | microcode_ctl-debuginfo | < 2.1-22.41.el7_4 | microcode_ctl-debuginfo-2.1-22.41.el7_4.x86_64.rpm |
RedHat | 7 | x86_64 | microcode_ctl | < 2.1-22.41.el7_4 | microcode_ctl-2.1-22.41.el7_4.x86_64.rpm |
4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
19.4%