Ubuntu Security Notice 5617-1 - It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Julien Grall discovered that Xen incorrectly handled memory barriers on ARM-based systems. An attacker could possibly use this issue to cause a denial of service, obtain sensitive information or escalate privileges.
650005c21b26b7970b9035b36b8dca3aa7d9fbba307cbcf7d4eded34c754cfb8
Red Hat Security Advisory 2021-3364-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
8be2838ca9398ff6abce781afdf077560075df20b0847d6a508d16dcc44b1757
Red Hat Security Advisory 2021-3317-01 - hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Special Register Buffer Data Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active. Issues addressed include information leakage and privilege escalation vulnerabilities.
63151fd7093596a21aba59a26aa0aaed57c915f09f52476a6a5c2090863a630d
Red Hat Security Advisory 2021-3322-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
9c8617e556978199de15feaad46ba81a7ee7d48810a006cbf687011b5bc03033
Red Hat Security Advisory 2021-3323-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
0654ec225c3c499ec3154849d056d9c98e9893ea869ddc8c50037040136385c9
Red Hat Security Advisory 2021-3255-02 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
9417e06e19534a6d0714e3e384aba45a2a7685ddf7850eebaf8e982ab5dca932
Red Hat Security Advisory 2021-3176-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
8932c00d1ea2a18dad753111afccfae29397628894b53501893ea1da0c57cfa6
Red Hat Security Advisory 2021-3029-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
5b874b801f093a7d2cbd0f40a423a50503597ecdde71a506901ac7c7d8aaa35d
Red Hat Security Advisory 2021-3028-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
a8b740a9e5c27302c1496d75587a3f096ac7a60dc1f83306894b963b360191fa
Red Hat Security Advisory 2021-3027-01 - The microcode_ctl packages provide microcode updates for Intel. Issues addressed include information leakage and privilege escalation vulnerabilities.
e769f2fd093043bd62df4c62f6ba76ba8e41ad015a576faea467430bf7ab4234
Red Hat Security Advisory 2020-2842-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Sampling issues were addressed.
13302dd0c178464aac1f730807510e7ab758da54a598b4507ab47b17801c43c5
Red Hat Security Advisory 2020-2771-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advances Update Support. Sampling issues were addressed.
0a6be9757d9e20745ed3c00866d657b9db25bd454370ef3ed07014c10eca01de
Red Hat Security Advisory 2020-2758-01 - An update for microcode_ctl is now available for Red at Enterprise Linux 7.7 Extended Update Support. Sampling issues were addressed.
553a91792595329cbadf8b388158818e4d2a5fa3921d631279128e3ad877d330
Red Hat Security Advisory 2020-2757-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Sampling issues were addressed.
df27d92b7b2be1d86fce3a32bc8fabd4f3d26bd0882c4ba838dcfaaa6536d896
Debian Linux Security Advisory 4698-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
6b0461d5fdc0442553e93411732b13c0f292cb8ee0cf3b5b3b0228efca950d91
Debian Linux Security Advisory 4699-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
5c9b08156b9df614e0b461fd3ef88e61fe9ad766f6bfda59ca0dca4bd59df181
Debian Linux Security Advisory 4701-1 - This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for the Special Register Buffer Data Sampling (CVE-2020-0543), Vector Register Sampling (CVE-2020-0548) and L1D Eviction Sampling (CVE-2020-0549) hardware vulnerabilities.
a7594ff915e8d7978545559a945ae55a7a497237c23303947c12d184661628a7
Red Hat Security Advisory 2020-2706-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
0ce53c5b973dad347dfb819e5135a8229ea0135629033df13c2d782de5d67305
Red Hat Security Advisory 2020-2707-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
5d0c7f46de5420f039ff3fcffdf6e9d31ae6a5697e2544cc8eccc442de38bfbd
Red Hat Security Advisory 2020-2680-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
0bcdd6a43e71ea3dad8f948f488881d0c049d32e76531272912a90cb1d418c90
Red Hat Security Advisory 2020-2679-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
d09e1e34b7561440b12ed670e8d10093540125d4a6d59263807a6d9032ff19d8
Red Hat Security Advisory 2020-2677-01 - An update for microcode_ctl is now available for Red Hat enterprise Linux 8.1 Extended Update Support.
ea9a908f1ca6fa9566334c18f71f8a818a07cc015488c3db63c5aaed5a3af2bf
Ubuntu Security Notice 4385-2 - USN-4385-1 provided updated Intel Processor Microcode. Unfortunately, that update prevented certain processors in the Intel Skylake family from booting successfully. Additionally, on Ubuntu 20.04 LTS, late loading of microcode was enabled, which could lead to system instability. This update reverts the microcode update for the Skylake processor family and disables the late loading option on Ubuntu 20.04 LTS. Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery. Various other issues were also addressed.
7a5311fd9395be788d4e44d398fc8710567f10630e93a9fd8de402cbc949634b
Ubuntu Security Notice 4392-1 - It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
a9845b95b2be0fccbe823366e518cf239b87cde96d4347530b55da617eeaf0ce
Ubuntu Security Notice 4388-1 - It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
24b25c54711167debfb3a1de96a5ccaa82b46c8875ceb35c4dff6a5f8c785c0b