The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Intel Processors: information disclosure via Cleanup Errors

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via Cleanup Errors of Intel Processors, in order to obtain sensitive information.
Impacted products: Debian, Fedora, HP ProLiant, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this bulletin: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 24/02/2020.
Références of this threat: CVE-2020-0548, CVE-2020-0549, DLA-2248-1, DSA-4701-1, FEDORA-2020-11ddbfbdf0, FEDORA-2020-e8835a5f8e, HPESBHF03985, INTEL-SA-00329, openSUSE-SU-2020:0791-1, RHSA-2020:2431-01, RHSA-2020:2432-01, RHSA-2020:2433-01, RHSA-2020:2677-01, RHSA-2020:2679-01, RHSA-2020:2680-01, RHSA-2020:2706-01, RHSA-2020:2707-01, RHSA-2020:2757-01, RHSA-2020:2758-01, RHSA-2020:2771-01, RHSA-2020:2842-01, SUSE-SU-2020:14394-1, USN-4385-1, USN-4385-2, VIGILANCE-VUL-31665.

Description of the vulnerability 

An attacker can bypass access restrictions to data via Cleanup Errors of Intel Processors, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat impacts software or systems such as Debian, Fedora, HP ProLiant, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer threat is low.

The trust level is of type confirmed by the editor, with an origin of privileged account.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this cybersecurity bulletin.

Solutions for this threat 

A10 ACOS: fixed versions for Intel.
Fixed versions are indicated in information sources.

Debian 8: new intel-microcode packages.
New packages are available:
  Debian 8: intel-microcode 3.20200609.2~deb8u1

Debian 9-10: new intel-microcode packages.
New packages are available:
  Debian 9: intel-microcode 3.20200609.2~deb9u1
  Debian 10: intel-microcode 3.20200609.2~deb10u1

Fedora 31: new microcode_ctl packages.
New packages are available:
  Fedora 31: microcode_ctl 2.1-39.fc31

Fedora 32: new microcode_ctl packages.
New packages are available:
  Fedora 32: microcode_ctl 2.1-39.fc32

HPE ProLiant: patch for Intel Cleanup Errors.
A patch is available:
  https://support.hpe.com/hpesc/public/home

openSUSE Leap 15.1: new ucode-intel packages.
New packages are available:
  openSUSE Leap 15.1: ucode-intel 20200602-lp151.2.24.1

RHEL 6.10: new microcode_ctl packages.
New packages are available:
  RHEL 6.10: microcode_ctl 1.17-33.26.el6_10

RHEL 6.5: new microcode_ctl packages.
New packages are available:
  RHEL 6.5: microcode_ctl 1.17-17.31.el6_5

RHEL 6.6: new microcode_ctl packages.
New packages are available:
  RHEL 6.6: microcode_ctl 1.17-19.29.el6_6

RHEL 7.2: new microcode_ctl packages.
New packages are available:
  RHEL 7.2: microcode_ctl 2.1-12.30.el7_2

RHEL 7.3: new microcode_ctl packages.
New packages are available:
  RHEL 7.3: microcode_ctl 2.1-16.33.el7_3

RHEL 7.4: new microcode_ctl packages.
New packages are available:
  RHEL 7.4: microcode_ctl 2.1-22.32.el7_4

RHEL 7.6: new microcode_ctl packages.
New packages are available:
  RHEL 7.6: microcode_ctl 2.1-47.14.el7_6

RHEL 7.7: new microcode_ctl packages.
New packages are available:
  RHEL 7.7: microcode_ctl 2.1-53.9.el7_7

RHEL 7.8: new microcode_ctl packages.
New packages are available:
  RHEL 7.8: microcode_ctl 2.1-61.6.el7_8

RHEL 8.0: new microcode_ctl packages.
New packages are available:
  RHEL 8.0: microcode_ctl 20180807a-2.20200609.1.el8_0

RHEL 8.1: new microcode_ctl packages.
New packages are available:
  RHEL 8.1: microcode_ctl 20190618-1.20200609.1.el8_1

RHEL 8.2: new microcode_ctl packages.
New packages are available:
  RHEL 8.2: microcode_ctl 20191115-4.20200602.2.el8_2

SUSE LE 11 SP3/4: new microcode_ctl packages.
New packages are available:
  SUSE LE 11 SP4: microcode_ctl 1.17-102.83.53.1
  SUSE LE 11 SP3: microcode_ctl 1.17-102.83.53.1

Ubuntu: new intel-microcode packages.
New packages are available:
  Ubuntu 20.04 LTS: intel-microcode 3.20200609.0ubuntu0.20.04.2
  Ubuntu 19.10: intel-microcode 3.20200609.0ubuntu0.19.10.2
  Ubuntu 18.04 LTS: intel-microcode 3.20200609.0ubuntu0.18.04.1
  Ubuntu 16.04 LTS: intel-microcode 3.20200609.0ubuntu0.16.04.1
  Ubuntu 14.04 ESM: intel-microcode 3.20200609.0ubuntu0.14.04.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computer security alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.