{"id":"RHSA-2020:2758","summary":"Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update","modified":"2025-11-22T12:03:56Z","published":"2024-09-16T04:16:04Z","upstream":["CVE-2020-0543","CVE-2020-0548","CVE-2020-0549"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:2758"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/5142691"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1827165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1849064"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2758.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0543"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0543"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/5142751"},{"type":"ARTICLE","url":"https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri"},{"type":"ARTICLE","url":"https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling"},{"type":"ARTICLE","url":"https://xenbits.xen.org/xsa/advisory-320.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0548"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0548"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0548"},{"type":"ARTICLE","url":"https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/"},{"type":"ARTICLE","url":"https://cacheoutattack.com/CacheOut.pdf"},{"type":"ARTICLE","url":"https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0549"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0549"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0549"}],"affected":[{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:rhel_eus:7.7::computenode","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-53.9.el7_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:2758.json"}},{"package":{"name":"microcode_ctl-debuginfo","ecosystem":"Red Hat:rhel_eus:7.7::computenode","purl":"pkg:rpm/redhat/microcode_ctl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-53.9.el7_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:2758.json"}},{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:rhel_eus:7.7::server","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-53.9.el7_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:2758.json"}},{"package":{"name":"microcode_ctl-debuginfo","ecosystem":"Red Hat:rhel_eus:7.7::server","purl":"pkg:rpm/redhat/microcode_ctl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-53.9.el7_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:2758.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}