Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2020.3373.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2020:3373-1)
Summary:The remote host is missing an update for the 'ucode-intel' package(s) announced via the SUSE-SU-2020:3373-1 advisory.
Description:Summary:
The remote host is missing an update for the 'ucode-intel' package(s) announced via the SUSE-SU-2020:3373-1 advisory.

Vulnerability Insight:
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20201110 official release.
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381
(bsc#1173594)
- CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381
(bsc#1173592)

Release notes:
- Security updates for
[INTEL-SA-00381]([link moved to references]
visory/intel-sa-00381.html).
- Security updates for
[INTEL-SA-00389]([link moved to references]
visory/intel-sa-00389.html).
- Update for functional issues. Refer to [Second Generation Intel(r)
Xeon(r) Processor Scalable Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) Processor
Scalable Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) Processor E5 v3
Product Family Specification Update]([link moved to references]
spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel(r) Core(tm)
Processor Families Specification Update]([link moved to references]
re/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel(r)
Core(tm) Processor Family Spec Update]([link moved to references]
re/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U
Quad-Core) Intel(r) Processor Families Specification Update]([link moved to references]
e-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel(r) Processor
Family Specification
Update]([link moved to references]) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) E3-1200 v6
Processor Family Specification Update]([link moved to references]
0v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel(r) Xeon(r) E-2100 and
E-2200 Processor Family Specification Update]([link moved to references]
on/xeon-e-2100-specification-update.html) for details.

### New Platforms Processor Stepping F-M-S/PI Old Ver
New Ver Products
:---------------:---------:------------:---------:---------:---------
CPX-SP A1 06-55-0b/bf 0700001e Xeon Scalable Gen3 LKF B2/B3 06-8a-01/10
Affected Software/OS:
'ucode-intel' package(s) on SUSE Linux Enterprise Module for Basesystem 15-SP2

Solution:
Please install the updated package(s).

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-8695
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQ24MFBVH3HJW3PNRQBRY4YXKC7GA57W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEM2FZWVE4FNGYNQU3WCBAWTZRBWDYUR/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-8696
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
Common Vulnerability Exposure (CVE) ID: CVE-2020-8698
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.