The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can bypass access restrictions to data via Cleanup Errors of Intel Processors, in order to obtain sensitive information.
Impacted products: SNS, Debian, Fedora, HP ProLiant, QRadar SIEM, Junos Space, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this bulletin: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 24/02/2020.
Références of this threat: 6344075, CERTFR-2020-AVI-618, CVE-2020-0548, CVE-2020-0549, DLA-2248-1, DSA-4701-1, FEDORA-2020-11ddbfbdf0, FEDORA-2020-e8835a5f8e, HPESBHF03985, INTEL-SA-00329, JSA11110, openSUSE-SU-2020:0791-1, RHSA-2020:2431-01, RHSA-2020:2432-01, RHSA-2020:2433-01, RHSA-2020:2677-01, RHSA-2020:2679-01, RHSA-2020:2680-01, RHSA-2020:2706-01, RHSA-2020:2707-01, RHSA-2020:2757-01, RHSA-2020:2758-01, RHSA-2020:2771-01, RHSA-2020:2842-01, STORM-2019-026, SUSE-SU-2020:14394-1, USN-4385-1, USN-4385-2, VIGILANCE-VUL-31665.
Description of the vulnerability 
An attacker can bypass access restrictions to data via Cleanup Errors of Intel Processors, in order to obtain sensitive information. Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This threat impacts software or systems such as SNS, Debian, Fedora, HP ProLiant, QRadar SIEM, Junos Space, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Our Vigil@nce team determined that the severity of this computer threat is low.
The trust level is of type confirmed by the editor, with an origin of privileged account.
This bulletin is about 2 vulnerabilities.
An attacker with a expert ability can exploit this cybersecurity bulletin.
Solutions for this threat 
A10 ACOS: fixed versions for Intel.
Fixed versions are indicated in information sources.
Debian 8: new intel-microcode packages.
New packages are available:
Debian 8: intel-microcode 3.20200609.2~deb8u1
Debian 9-10: new intel-microcode packages.
New packages are available:
Debian 9: intel-microcode 3.20200609.2~deb9u1
Debian 10: intel-microcode 3.20200609.2~deb10u1
Fedora 31: new microcode_ctl packages.
New packages are available:
Fedora 31: microcode_ctl 2.1-39.fc31
Fedora 32: new microcode_ctl packages (19/06/2020).
New packages are available:
Fedora 32: microcode_ctl 2.1-39.fc32
HPE ProLiant: patch for Intel Cleanup Errors.
A patch is available:
https://support.hpe.com/hpesc/public/home
IBM QRadar SIEM: patch for Components.
A patch is indicated in information sources.
Juniper Junos Space: version 20.3R1.
The version 20.3R1 is fixed:
https://www.juniper.net/support/downloads/
openSUSE Leap 15.1: new ucode-intel packages.
New packages are available:
openSUSE Leap 15.1: ucode-intel 20200602-lp151.2.24.1
RHEL 6.10: new microcode_ctl packages.
New packages are available:
RHEL 6.10: microcode_ctl 1.17-33.26.el6_10
RHEL 6.5: new microcode_ctl packages.
New packages are available:
RHEL 6.5: microcode_ctl 1.17-17.31.el6_5
RHEL 6.6: new microcode_ctl packages.
New packages are available:
RHEL 6.6: microcode_ctl 1.17-19.29.el6_6
RHEL 7.2: new microcode_ctl packages.
New packages are available:
RHEL 7.2: microcode_ctl 2.1-12.30.el7_2
RHEL 7.3: new microcode_ctl packages.
New packages are available:
RHEL 7.3: microcode_ctl 2.1-16.33.el7_3
RHEL 7.4: new microcode_ctl packages.
New packages are available:
RHEL 7.4: microcode_ctl 2.1-22.32.el7_4
RHEL 7.6: new microcode_ctl packages.
New packages are available:
RHEL 7.6: microcode_ctl 2.1-47.14.el7_6
RHEL 7.7: new microcode_ctl packages.
New packages are available:
RHEL 7.7: microcode_ctl 2.1-53.9.el7_7
RHEL 7.8: new microcode_ctl packages.
New packages are available:
RHEL 7.8: microcode_ctl 2.1-61.6.el7_8
RHEL 8.0: new microcode_ctl packages.
New packages are available:
RHEL 8.0: microcode_ctl 20180807a-2.20200609.1.el8_0
RHEL 8.1: new microcode_ctl packages.
New packages are available:
RHEL 8.1: microcode_ctl 20190618-1.20200609.1.el8_1
RHEL 8.2: new microcode_ctl packages.
New packages are available:
RHEL 8.2: microcode_ctl 20191115-4.20200602.2.el8_2
Stormshield Network Security: solution for Intel Processors.
The solution is indicated in information sources.
SUSE LE 11 SP3/4: new microcode_ctl packages.
New packages are available:
SUSE LE 11 SP4: microcode_ctl 1.17-102.83.53.1
SUSE LE 11 SP3: microcode_ctl 1.17-102.83.53.1
Ubuntu: new intel-microcode packages.
New packages are available:
Ubuntu 20.04 LTS: intel-microcode 3.20200609.0ubuntu0.20.04.2
Ubuntu 19.10: intel-microcode 3.20200609.0ubuntu0.19.10.2
Ubuntu 18.04 LTS: intel-microcode 3.20200609.0ubuntu0.18.04.1
Ubuntu 16.04 LTS: intel-microcode 3.20200609.0ubuntu0.16.04.1
Ubuntu 14.04 ESM: intel-microcode 3.20200609.0ubuntu0.14.04.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides computer security alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.
|