Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4934 - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html - Vendor Advisory |
Information
Published : 2021-06-09 19:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24513
Mitre link : CVE-2020-24513
CVE.ORG link : CVE-2020-24513
JSON object : View
Products Affected
intel
- celeron_j3455
- celeron_j4125
- celeron_n4120
- atom_x6211e
- atom_c3538
- p5962b
- atom_x5-a3950
- celeron_j4025
- atom_c3758r
- atom_c3830
- atom_c3338r
- celeron_j4005
- celeron_n6211
- atom_x5-a3940
- core_i5-l16g7
- atom_x5-a3930
- celeron_n4100
- atom_x5-a3960
- atom_c3436l
- core_i3-l13g4
- atom_c3955
- pentium_silver_j5005
- pentium_silver_j5040
- atom_p5942b
- atom_c3708
- celeron_j4105
- atom_c3858
- celeron_j3455e
- atom_x6413e
- atom_c3336
- pentium_n4200e
- p5931b
- atom_c3758
- atom_c3958
- atom_c3558rc
- atom_c3850
- atom_c3950
- pentium_n4200
- atom_c3508
- atom_x6427fe
- celeron_n3350
- atom_c3308
- atom_c3558
- atom_x6200fe
- pentium_n6415
- atom_c3750
- p5921b
- pentium_j6425
- celeron_j3355
- atom_c3558r
- celeron_n3450
- celeron_j3355e
- pentium_j4205
- celeron_j6413
- celeron_n4000
- atom_c3808
- atom_c3338
- pentium_silver_n5000
- atom_x6425re
- celeron_n3350e
- pentium_silver_n5030
- atom_x6212re
- celeron_n4020
- atom_x6425e
siemens
- simatic_drive_controller_firmware
- simatic_drive_controller
- simatic_ipc127e_firmware
- simatic_et_200sp_open_controller
- simatic_et_200sp_open_controller_firmware
- simatic_ipc127e
debian
- debian_linux
CWE