Búsqueda de    
Vulnerabilidad   
    Buscar 211766 Descripciones CVE y
97459 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.4.2020.3372.1
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2020:3372-1)
Resumen:The remote host is missing an update for the 'ucode-intel' package(s) announced via the SUSE-SU-2020:3372-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'ucode-intel' package(s) announced via the SUSE-SU-2020:3372-1 advisory.

Vulnerability Insight:
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20201110 official release.
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381
(bsc#1173594)
- CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381
(bsc#1173592)

Release notes:
- Security updates for
[INTEL-SA-00381]([link moved to references]
visory/intel-sa-00381.html).
- Security updates for
[INTEL-SA-00389]([link moved to references]
visory/intel-sa-00389.html).
- Update for functional issues. Refer to [Second Generation Intel(r)
Xeon(r) Processor Scalable Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) Processor
Scalable Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) Processor E5 v3
Product Family Specification Update]([link moved to references]
spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel(r) Core(tm)
Processor Families Specification Update]([link moved to references]
re/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel(r)
Core(tm) Processor Family Spec Update]([link moved to references]
re/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U
Quad-Core) Intel(r) Processor Families Specification Update]([link moved to references]
e-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel(r) Processor
Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) E3-1200 v6
Processor Family Specification Update]([link moved to references]
0v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) E-2100 and
E-2200 Processor Family Specification Update]([link moved to references]
on/xeon-e-2100-specification-update.html) for details.

### New Platforms Processor Stepping F-M-S/PI Old Ver
New Ver Products
:---------------:---------:------------:---------:---------:---------
CPX-SP A1 06-55-0b/bf 0700001e Xeon Scalable Gen3 LKF B2/B3 06-8a-01/10
Affected Software/OS:
'ucode-intel' package(s) on SUSE Linux Enterprise Module for Basesystem 15-SP1

Solution:
Please install the updated package(s).

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2020-8695
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQ24MFBVH3HJW3PNRQBRY4YXKC7GA57W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEM2FZWVE4FNGYNQU3WCBAWTZRBWDYUR/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8696
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
Common Vulnerability Exposure (CVE) ID: CVE-2020-8698
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 97459 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2021 E-Soft Inc. Todos los derechos reservados.