A potential domain bypass transient execution vulnerability was discovered on some Intel Atom® processors that uses a microarchitectural incidental channel. Currently this channel can reveal supervisor data in the L1 cache and the contents of recent stores. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Extended Lifecycle Support Via RHSA-2021:2299 https://access.redhat.com/errata/RHSA-2021:2299
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Via RHSA-2021:2302 https://access.redhat.com/errata/RHSA-2021:2302
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Via RHSA-2021:2300 https://access.redhat.com/errata/RHSA-2021:2300
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:2306 https://access.redhat.com/errata/RHSA-2021:2306
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:2307 https://access.redhat.com/errata/RHSA-2021:2307
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:2308 https://access.redhat.com/errata/RHSA-2021:2308
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2021:2301 https://access.redhat.com/errata/RHSA-2021:2301
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Advanced Update Support Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions Red Hat Enterprise Linux 7.6 Telco Extended Update Support Via RHSA-2021:2303 https://access.redhat.com/errata/RHSA-2021:2303
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:2304 https://access.redhat.com/errata/RHSA-2021:2304
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:2305 https://access.redhat.com/errata/RHSA-2021:2305
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-24513