MGASA-2021-0140

Source
https://advisories.mageia.org/MGASA-2021-0140.html
Import Source
https://advisories.mageia.org/MGASA-2021-0140.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0140
Related
Published
2021-03-17T06:16:07Z
Modified
2021-03-17T06:04:06Z
Summary
Updated microcode package fixes security vulnerabilities
Details

This update adds new microcode updates to mitigate CVE-2020-8696 for Intel Skylake server (50654) and Cascade Lake Server (50656 & 50657) processors. The new microcode update mitigates an issue when using an active JTAG agent like In Target Probe (ITP), Direct Connect Interface (DCI) or a Baseboard Management Controller (BMC) to take the CPU JTAG/TAP out of reset and then returning it to reset.

Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2020-8698).

Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2020-8696).

References
Credits

Affected packages

Mageia:7 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20210216-1.mga7.nonfree

Ecosystem specific

{
    "section": "nonfree"
}

Mageia:8 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20210216-1.mga8.nonfree

Ecosystem specific

{
    "section": "nonfree"
}