Updated microcode packages fix security vulnerabilities
Publication date: 13 Jun 2021Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 7 , 8
CVE: CVE-2020-24489 , CVE-2020-24511 , CVE-2020-24513
Description
Updated microcodes for Intel processors, fixing various functional issues, and at least the following security issues: Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access (CVE-2020-24489). Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2020-24511). Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (CVE-2020-24513). For more info about this update, see the refenced links.
References
- https://bugs.mageia.org/show_bug.cgi?id=29095
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
SRPMS
7/nonfree
- microcode-0.20210608-1.mga7.nonfree
8/nonfree
- microcode-0.20210608-1.mga8.nonfree