Vulnerability Database
Blog
FAQ
Docs
RHSA-2021:3028
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2021:3028
Import Source
https://security.access.redhat.com/data/osv/RHSA-2021:3028.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2021:3028
Related
CVE-2020-0543
CVE-2020-0548
CVE-2020-0549
CVE-2020-24489
CVE-2020-24511
CVE-2020-24512
CVE-2020-8695
CVE-2020-8696
CVE-2020-8698
Published
2024-09-16T05:58:16Z
Modified
2024-09-16T05:58:16Z
Severity
8.8 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Details
References
https://access.redhat.com/errata/RHSA-2021:3028
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=1788786
https://bugzilla.redhat.com/show_bug.cgi?id=1788788
https://bugzilla.redhat.com/show_bug.cgi?id=1827165
https://bugzilla.redhat.com/show_bug.cgi?id=1828583
https://bugzilla.redhat.com/show_bug.cgi?id=1890355
https://bugzilla.redhat.com/show_bug.cgi?id=1890356
https://bugzilla.redhat.com/show_bug.cgi?id=1897684
https://bugzilla.redhat.com/show_bug.cgi?id=1962650
https://bugzilla.redhat.com/show_bug.cgi?id=1962702
https://bugzilla.redhat.com/show_bug.cgi?id=1962722
https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3028.json
https://access.redhat.com/security/cve/CVE-2020-0543
https://www.cve.org/CVERecord?id=CVE-2020-0543
https://nvd.nist.gov/vuln/detail/CVE-2020-0543
https://access.redhat.com/solutions/5142691
https://access.redhat.com/solutions/5142751
https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri
https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling
https://xenbits.xen.org/xsa/advisory-320.html
https://access.redhat.com/security/cve/CVE-2020-0548
https://www.cve.org/CVERecord?id=CVE-2020-0548
https://nvd.nist.gov/vuln/detail/CVE-2020-0548
https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling
https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/
https://cacheoutattack.com/CacheOut.pdf
https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling
https://access.redhat.com/security/cve/CVE-2020-0549
https://www.cve.org/CVERecord?id=CVE-2020-0549
https://nvd.nist.gov/vuln/detail/CVE-2020-0549
https://access.redhat.com/security/cve/CVE-2020-8695
https://www.cve.org/CVERecord?id=CVE-2020-8695
https://nvd.nist.gov/vuln/detail/CVE-2020-8695
https://en.wikipedia.org/wiki/Power_analysis
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
https://access.redhat.com/security/cve/CVE-2020-8696
https://www.cve.org/CVERecord?id=CVE-2020-8696
https://nvd.nist.gov/vuln/detail/CVE-2020-8696
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html
https://access.redhat.com/security/cve/CVE-2020-8698
https://www.cve.org/CVERecord?id=CVE-2020-8698
https://nvd.nist.gov/vuln/detail/CVE-2020-8698
https://access.redhat.com/security/cve/CVE-2020-24489
https://www.cve.org/CVERecord?id=CVE-2020-24489
https://nvd.nist.gov/vuln/detail/CVE-2020-24489
https://access.redhat.com/security/cve/CVE-2020-24511
https://www.cve.org/CVERecord?id=CVE-2020-24511
https://nvd.nist.gov/vuln/detail/CVE-2020-24511
https://access.redhat.com/security/cve/CVE-2020-24512
https://www.cve.org/CVERecord?id=CVE-2020-24512
https://nvd.nist.gov/vuln/detail/CVE-2020-24512
Affected packages
Red Hat:enterprise_linux:7::client
/
microcode_ctl
Package
Name
microcode_ctl
Purl
pkg:rpm/redhat/microcode_ctl
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-73.11.el7_9
Red Hat:enterprise_linux:7::client
/
microcode_ctl-debuginfo
Package
Name
microcode_ctl-debuginfo
Purl
pkg:rpm/redhat/microcode_ctl-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-73.11.el7_9
Red Hat:enterprise_linux:7::server
/
microcode_ctl
Package
Name
microcode_ctl
Purl
pkg:rpm/redhat/microcode_ctl
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-73.11.el7_9
Red Hat:enterprise_linux:7::server
/
microcode_ctl-debuginfo
Package
Name
microcode_ctl-debuginfo
Purl
pkg:rpm/redhat/microcode_ctl-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-73.11.el7_9
Red Hat:enterprise_linux:7::workstation
/
microcode_ctl
Package
Name
microcode_ctl
Purl
pkg:rpm/redhat/microcode_ctl
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-73.11.el7_9
Red Hat:enterprise_linux:7::workstation
/
microcode_ctl-debuginfo
Package
Name
microcode_ctl-debuginfo
Purl
pkg:rpm/redhat/microcode_ctl-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2:2.1-73.11.el7_9
RHSA-2021:3028 - OSV