Anfälligkeitssuche        Suche in 211766 CVE Beschreibungen
und 97459 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2020.3372.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2020:3372-1)
Zusammenfassung:The remote host is missing an update for the 'ucode-intel' package(s) announced via the SUSE-SU-2020:3372-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'ucode-intel' package(s) announced via the SUSE-SU-2020:3372-1 advisory.

Vulnerability Insight:
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20201110 official release.
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381
(bsc#1173594)
- CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381
(bsc#1173592)

Release notes:
- Security updates for
[INTEL-SA-00381]([link moved to references]
visory/intel-sa-00381.html).
- Security updates for
[INTEL-SA-00389]([link moved to references]
visory/intel-sa-00389.html).
- Update for functional issues. Refer to [Second Generation Intel(r)
Xeon(r) Processor Scalable Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) Processor
Scalable Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) Processor E5 v3
Product Family Specification Update]([link moved to references]
spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel(r) Core(tm)
Processor Families Specification Update]([link moved to references]
re/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel(r)
Core(tm) Processor Family Spec Update]([link moved to references]
re/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U
Quad-Core) Intel(r) Processor Families Specification Update]([link moved to references]
e-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel(r) Processor
Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) E3-1200 v6
Processor Family Specification Update]([link moved to references]
0v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) E-2100 and
E-2200 Processor Family Specification Update]([link moved to references]
on/xeon-e-2100-specification-update.html) for details.

### New Platforms Processor Stepping F-M-S/PI Old Ver
New Ver Products
:---------------:---------:------------:---------:---------:---------
CPX-SP A1 06-55-0b/bf 0700001e Xeon Scalable Gen3 LKF B2/B3 06-8a-01/10
Affected Software/OS:
'ucode-intel' package(s) on SUSE Linux Enterprise Module for Basesystem 15-SP1

Solution:
Please install the updated package(s).

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-8695
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQ24MFBVH3HJW3PNRQBRY4YXKC7GA57W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEM2FZWVE4FNGYNQU3WCBAWTZRBWDYUR/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8696
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
Common Vulnerability Exposure (CVE) ID: CVE-2020-8698
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 97459 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.