MGASA-2021-0256 - Updated microcode packages fix security vulnerabilities

Publication date: 13 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0256.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2020-24489,
     CVE-2020-24511,
     CVE-2020-24513

Updated microcodes for Intel processors, fixing various functional
issues, and atleast the following security issues:

Incomplete cleanup in some Intel(R) VT-d products may allow an
authenticated user to potentially enable escalation of privilege
via local access (CVE-2020-24489).

Improper isolation of shared resources in some Intel(R) Processors may
allow an authenticated user to potentially enable information disclosure
via local access (CVE-2020-24511).

Domain-bypass transient execution vulnerability in some Intel Atom(R)
Processors may allow an authenticated user to potentially enable information
disclosure via local access (CVE-2020-24513).

For more info about this update, see the refenced links.

References:
- https://bugs.mageia.org/show_bug.cgi?id=29095
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513

SRPMS:
- 8/nonfree/microcode-0.20210608-1.mga8.nonfree
- 7/nonfree/microcode-0.20210608-1.mga7.nonfree

Mageia 2021-0256: microcode security update

Updated microcodes for Intel processors, fixing various functional issues, and atleast the following security issues: Incomplete cleanup in some Intel(R) VT-d products may allow a...

Summary

Updated microcodes for Intel processors, fixing various functional issues, and atleast the following security issues:
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access (CVE-2020-24489).
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2020-24511).
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2020-24513).
For more info about this update, see the refenced links.

References

- https://bugs.mageia.org/show_bug.cgi?id=29095

- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513

Resolution

MGASA-2021-0256 - Updated microcode packages fix security vulnerabilities

SRPMS

- 8/nonfree/microcode-0.20210608-1.mga8.nonfree

- 7/nonfree/microcode-0.20210608-1.mga7.nonfree

Severity
Publication date: 13 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0256.html
Type: security
CVE: CVE-2020-24489, CVE-2020-24511, CVE-2020-24513

Related News