USN-4985-1: Intel Microcode vulnerabilities
Severity
High
Vendor
VMware Tanzu
Versions Affected
- Canonical Ubuntu 14.04
- Canonical Ubuntu 16.04
- Canonical Ubuntu 18.04
Description
It was discovered that some Intel processors may not properly invalidate cache entries used by Intel Virtualization Technology for Directed I/O (VT-d). This may allow a local user to perform a privilege escalation attack. (CVE-2020-24489)
Joseph Nuzman discovered that some Intel processors may not properly apply EIBRS mitigations (originally developed for CVE-2017-5715) and hence may allow unauthorized memory reads via sidechannel attacks. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2020-24511)
Travis Downs discovered that some Intel processors did not properly flush cache-lines for trivial-data values. This may allow an unauthorized user to infer the presence of these trivial-data-cache-lines via timing sidechannel attacks. A local attacker could use this to expose sensitive information. (CVE-2020-24512)
It was discovered that certain Intel Atom processors could expose memory contents stored in microarchitectural buffers. A local attacker could use this to expose sensitive information. (CVE-2020-24513)
CVEs contained in this USN include: CVE-2020-24512, CVE-2020-24513, CVE-2020-24511, CVE-2020-24489
Affected VMware Products and Versions
Severity is high unless otherwise noted.
-
Isolation Segment
- 2.7.x versions with Xenial Stemcells prior to 456.165
- 2.8.x versions with Xenial Stemcells prior to 621.130
- 2.9.x versions with Xenial Stemcells prior to 621.130
- 2.10.x versions with Xenial Stemcells prior to 621.130
- 2.11.x versions with Xenial Stemcells prior to 621.130
-
Operations Manager
- 2.9.x versions prior to 2.9.20
- 2.10.x versions prior to 2.10.13
-
VMware Tanzu Application Service for VMs
- 2.7.x versions with Xenial Stemcells prior to 456.165
- 2.8.x versions with Xenial Stemcells prior to 621.130
- 2.9.x versions with Xenial Stemcells prior to 621.130
- 2.10.x versions with Xenial Stemcells prior to 621.130
- 2.11.x versions with Xenial Stemcells prior to 621.130
- 2.12.x versions with Xenial Stemcells prior to 621.130
Mitigation
Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:
-
Isolation Segment
- 2.7.x: Upgrade Xenial Stemcells to 456.165 or greater
- 2.8.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.9.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.10.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.11.x: Upgrade Xenial Stemcells to 621.130 or greater
-
Operations Manager
- 2.9.20
- 2.10.13
-
VMware Tanzu Application Service for VMs
- 2.7.x: Upgrade Xenial Stemcells to 456.165 or greater
- 2.8.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.9.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.10.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.11.x: Upgrade Xenial Stemcells to 621.130 or greater
- 2.12.x: Upgrade Xenial Stemcells to 621.130 or greater
References
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24512
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24513
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24511
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24489
- https://ubuntu.com/security/notices/USN-4985-1
- https://cloudfoundry.org/blog/usn-4985-1
History
2021-12-08: Initial vulnerability report published.