Vulnerability Database
Blog
FAQ
Docs
RHSA-2020:2680
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2020:2680
Import Source
https://security.access.redhat.com/data/osv/RHSA-2020:2680.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2020:2680
Related
CVE-2020-0543
CVE-2020-0548
CVE-2020-0549
Published
2024-09-16T04:16:27Z
Modified
2024-09-16T04:16:27Z
Severity
6.5 (Medium)
CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS Calculator
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Details
References
https://access.redhat.com/errata/RHSA-2020:2680
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/solutions/5142691
https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling
https://bugzilla.redhat.com/show_bug.cgi?id=1788786
https://bugzilla.redhat.com/show_bug.cgi?id=1788788
https://bugzilla.redhat.com/show_bug.cgi?id=1827165
https://bugzilla.redhat.com/show_bug.cgi?id=1849060
https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_2680.json
https://access.redhat.com/security/cve/CVE-2020-0543
https://www.cve.org/CVERecord?id=CVE-2020-0543
https://nvd.nist.gov/vuln/detail/CVE-2020-0543
https://access.redhat.com/solutions/5142751
https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri
https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling
https://xenbits.xen.org/xsa/advisory-320.html
https://access.redhat.com/security/cve/CVE-2020-0548
https://www.cve.org/CVERecord?id=CVE-2020-0548
https://nvd.nist.gov/vuln/detail/CVE-2020-0548
https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/
https://cacheoutattack.com/CacheOut.pdf
https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling
https://access.redhat.com/security/cve/CVE-2020-0549
https://www.cve.org/CVERecord?id=CVE-2020-0549
https://nvd.nist.gov/vuln/detail/CVE-2020-0549
Affected packages
Red Hat:rhel_aus:7.3::server
/
microcode_ctl
Package
Name
microcode_ctl
Purl
pkg:rpm/redhat/microcode_ctl
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-16.33.el7_3
Red Hat:rhel_aus:7.3::server
/
microcode_ctl-debuginfo
Package
Name
microcode_ctl-debuginfo
Purl
pkg:rpm/redhat/microcode_ctl-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-16.33.el7_3
Red Hat:rhel_e4s:7.3::server
/
microcode_ctl
Package
Name
microcode_ctl
Purl
pkg:rpm/redhat/microcode_ctl
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-16.33.el7_3
Red Hat:rhel_e4s:7.3::server
/
microcode_ctl-debuginfo
Package
Name
microcode_ctl-debuginfo
Purl
pkg:rpm/redhat/microcode_ctl-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-16.33.el7_3
Red Hat:rhel_tus:7.3::server
/
microcode_ctl
Package
Name
microcode_ctl
Purl
pkg:rpm/redhat/microcode_ctl
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-16.33.el7_3
Red Hat:rhel_tus:7.3::server
/
microcode_ctl-debuginfo
Package
Name
microcode_ctl-debuginfo
Purl
pkg:rpm/redhat/microcode_ctl-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-16.33.el7_3
RHSA-2020:2680 - OSV