SUSE-SU-2021:1933-1 -- SLES ucode-intelID: oval:org.secpod.oval:def:89047181 | Date: (C)2022-10-21 (M)2024-01-29 |
Class: PATCH | Family: unix |
This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20210608 release. - CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0 0465.html - CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root branches from controlling the branch predictions of the root See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0 0464.html(bsc#1179837 INTEL-SA-00464
Platform: |
SUSE Linux Enterprise Server 15 SP2 |
SUSE Linux Enterprise Server 15 SP3 |
SUSE Linux Enterprise Desktop 15 SP2 |
SUSE Linux Enterprise Desktop 15 SP3 |