|Category:||Debian Local Security Checks|
|Title:||Debian: Security Advisory for intel-microcode (DSA-4701-1)|
|Summary:||The remote host is missing an update for the 'intel-microcode'; package(s) announced via the DSA-4701-1 advisory.|
The remote host is missing an update for the 'intel-microcode'
package(s) announced via the DSA-4701-1 advisory.
This update ships updated CPU microcode for some types of Intel CPUs and
provides mitigations for the Special Register Buffer Data Sampling
(CVE-2020-0543), Vector Register Sampling (CVE-2020-0548) and L1D Eviction Sampling (CVE-2020-0549 ) hardware vulnerabilities.
The microcode update for HEDT and Xeon CPUs with signature 0x50654 which
was reverted in DSA 4565-2 is now included again with a fixed release.
The upstream update for Skylake-U/Y (signature 0x406e3) had to be
excluded from this update due to reported hangs on boot.
'intel-microcode' package(s) on Debian Linux.
For the oldstable distribution (stretch), these problems have been fixed
in version 3.20200609.2~
For the stable distribution (buster), these problems have been fixed in
We recommend that you upgrade your intel-microcode packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-0543|
SuSE Security Announcement: openSUSE-SU-2020:0818 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0965 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0985 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2020-0548
Debian Security Information: DSA-4701 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0791 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2020-0549
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.