{"id":"RHSA-2021:3364","summary":"Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update","modified":"2025-11-22T12:24:08Z","published":"2024-09-16T05:58:43Z","upstream":["CVE-2020-0543","CVE-2020-0548","CVE-2020-0549","CVE-2020-24489","CVE-2020-24511","CVE-2020-24512","CVE-2020-8695","CVE-2020-8696","CVE-2020-8698"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1827165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890355"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962650"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962722"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1972326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1972329"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3364.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0543"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0543"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0543"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/5142691"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/5142751"},{"type":"ARTICLE","url":"https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri"},{"type":"ARTICLE","url":"https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling"},{"type":"ARTICLE","url":"https://xenbits.xen.org/xsa/advisory-320.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0548"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0548"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0548"},{"type":"ARTICLE","url":"https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling"},{"type":"ARTICLE","url":"https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/"},{"type":"ARTICLE","url":"https://cacheoutattack.com/CacheOut.pdf"},{"type":"ARTICLE","url":"https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-0549"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-0549"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0549"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8695"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/5569051"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8695"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8695"},{"type":"ARTICLE","url":"https://en.wikipedia.org/wiki/Power_analysis"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8696"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8696"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8696"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8698"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8698"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24489"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24489"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24489"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24511"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24511"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24511"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-24512"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-24512"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24512"}],"affected":[{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:rhel_eus:8.2::baseos","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:20191115-4.20210608.1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3364.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}