All Vulnerability Reports

USN-4985-1: Intel Microcode vulnerabilities


Severity

High

Vendor

VMware Tanzu

Versions Affected

  • Canonical Ubuntu 14.04
  • Canonical Ubuntu 16.04
  • Canonical Ubuntu 18.04

Description

It was discovered that some Intel processors may not properly invalidate cache entries used by Intel Virtualization Technology for Directed I/O (VT-d). This may allow a local user to perform a privilege escalation attack. (CVE-2020-24489)

Joseph Nuzman discovered that some Intel processors may not properly apply EIBRS mitigations (originally developed for CVE-2017-5715) and hence may allow unauthorized memory reads via sidechannel attacks. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2020-24511)

Travis Downs discovered that some Intel processors did not properly flush cache-lines for trivial-data values. This may allow an unauthorized user to infer the presence of these trivial-data-cache-lines via timing sidechannel attacks. A local attacker could use this to expose sensitive information. (CVE-2020-24512)

It was discovered that certain Intel Atom processors could expose memory contents stored in microarchitectural buffers. A local attacker could use this to expose sensitive information. (CVE-2020-24513)

CVEs contained in this USN include: CVE-2020-24512, CVE-2020-24513, CVE-2020-24511, CVE-2020-24489

Affected VMware Products and Versions

Severity is high unless otherwise noted.

  • Isolation Segment
    • 2.7.x versions with Xenial Stemcells prior to 456.165
    • 2.8.x versions with Xenial Stemcells prior to 621.130
    • 2.9.x versions with Xenial Stemcells prior to 621.130
    • 2.10.x versions with Xenial Stemcells prior to 621.130
    • 2.11.x versions with Xenial Stemcells prior to 621.130
  • Operations Manager
    • 2.9.x versions prior to 2.9.20
    • 2.10.x versions prior to 2.10.13
  • VMware Tanzu Application Service for VMs
    • 2.7.x versions with Xenial Stemcells prior to 456.165
    • 2.8.x versions with Xenial Stemcells prior to 621.130
    • 2.9.x versions with Xenial Stemcells prior to 621.130
    • 2.10.x versions with Xenial Stemcells prior to 621.130
    • 2.11.x versions with Xenial Stemcells prior to 621.130
    • 2.12.x versions with Xenial Stemcells prior to 621.130

Mitigation

Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:

  • Isolation Segment
    • 2.7.x: Upgrade Xenial Stemcells to 456.165 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.130 or greater
  • Operations Manager
    • 2.9.20
    • 2.10.13
  • VMware Tanzu Application Service for VMs
    • 2.7.x: Upgrade Xenial Stemcells to 456.165 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.130 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.130 or greater

References

History

2021-12-08: Initial vulnerability report published.