Bug 1962666 (CVE-2020-24513) - CVE-2020-24513 hw: information disclosure on some Intel Atom processors
Summary: CVE-2020-24513 hw: information disclosure on some Intel Atom processors
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-24513
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1962668 1962669 1962670 1962672 1962673 1962674 1962675 1962676 1962677 1962678 1962679 1962680
Blocks: 1962646
TreeView+ depends on / blocked
 
Reported: 2021-05-20 13:25 UTC by Petr Matousek
Modified: 2021-09-23 15:31 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: ---
Doc Text:
A potential domain bypass transient execution vulnerability was discovered on some Intel Atom® processors that uses a microarchitectural incidental channel. Currently this channel can reveal supervisor data in the L1 cache and the contents of recent stores. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.
Clone Of:
Environment:
Last Closed: 2021-06-09 03:04:11 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:2299 0 None None None 2021-06-09 00:27:57 UTC
Red Hat Product Errata RHSA-2021:2300 0 None None None 2021-06-09 01:04:19 UTC
Red Hat Product Errata RHSA-2021:2301 0 None None None 2021-06-09 02:02:09 UTC
Red Hat Product Errata RHSA-2021:2302 0 None None None 2021-06-09 00:38:19 UTC
Red Hat Product Errata RHSA-2021:2303 0 None None None 2021-06-09 02:13:52 UTC
Red Hat Product Errata RHSA-2021:2304 0 None None None 2021-06-09 02:14:35 UTC
Red Hat Product Errata RHSA-2021:2305 0 None None None 2021-06-09 02:15:02 UTC
Red Hat Product Errata RHSA-2021:2306 0 None None None 2021-06-09 01:09:30 UTC
Red Hat Product Errata RHSA-2021:2307 0 None None None 2021-06-09 01:41:28 UTC
Red Hat Product Errata RHSA-2021:2308 0 None None None 2021-06-09 01:56:40 UTC

Description Petr Matousek 2021-05-20 13:25:56 UTC
A potential domain bypass transient execution vulnerability was discovered on some Intel Atom® processors that uses a microarchitectural incidental channel. Currently this channel can reveal supervisor data in the L1 cache and the contents of recent stores. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.

Comment 2 errata-xmlrpc 2021-06-09 00:27:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Extended Lifecycle Support

Via RHSA-2021:2299 https://access.redhat.com/errata/RHSA-2021:2299

Comment 3 errata-xmlrpc 2021-06-09 00:38:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Advanced Update Support

Via RHSA-2021:2302 https://access.redhat.com/errata/RHSA-2021:2302

Comment 4 errata-xmlrpc 2021-06-09 01:04:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Advanced Update Support

Via RHSA-2021:2300 https://access.redhat.com/errata/RHSA-2021:2300

Comment 5 errata-xmlrpc 2021-06-09 01:09:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Extended Update Support

Via RHSA-2021:2306 https://access.redhat.com/errata/RHSA-2021:2306

Comment 6 errata-xmlrpc 2021-06-09 01:41:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:2307 https://access.redhat.com/errata/RHSA-2021:2307

Comment 7 errata-xmlrpc 2021-06-09 01:56:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:2308 https://access.redhat.com/errata/RHSA-2021:2308

Comment 8 errata-xmlrpc 2021-06-09 02:02:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.4 Advanced Update Support
  Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.4 Telco Extended Update Support

Via RHSA-2021:2301 https://access.redhat.com/errata/RHSA-2021:2301

Comment 9 errata-xmlrpc 2021-06-09 02:13:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.6 Advanced Update Support
  Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.6 Telco Extended Update Support

Via RHSA-2021:2303 https://access.redhat.com/errata/RHSA-2021:2303

Comment 10 errata-xmlrpc 2021-06-09 02:14:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Extended Update Support

Via RHSA-2021:2304 https://access.redhat.com/errata/RHSA-2021:2304

Comment 11 errata-xmlrpc 2021-06-09 02:15:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:2305 https://access.redhat.com/errata/RHSA-2021:2305

Comment 12 Product Security DevOps Team 2021-06-09 03:04:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-24513


Note You need to log in before you can comment on or make changes to this bug.