[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2021:1933-1 -- SLES ucode-intel

ID: oval:org.secpod.oval:def:89047181Date: (C)2022-10-21   (M)2024-01-29
Class: PATCHFamily: unix




This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20210608 release. - CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0 0465.html - CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root branches from controlling the branch predictions of the root See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0 0464.html(bsc#1179837 INTEL-SA-00464

Platform:
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Desktop 15 SP2
SUSE Linux Enterprise Desktop 15 SP3
Product:
ucode-intel
Reference:
SUSE-SU-2021:1933-1
CVE-2020-24489
CVE-2020-24511
CVE-2020-24512
CVE-2020-24513
CVE    4
CVE-2020-24513
CVE-2020-24512
CVE-2020-24489
CVE-2020-24511
...
CPE    5
cpe:/a:microcode:ucode-intel
cpe:/o:suse:suse_linux_enterprise_server:15:sp3
cpe:/o:suse:suse_linux_enterprise_server:15:sp2
cpe:/o:suse:suse_linux_enterprise_desktop:15:sp3
...

© SecPod Technologies