Unrated severityNVD Advisory· Published Jun 9, 2021· Updated Aug 4, 2024
CVE-2020-24513
CVE-2020-24513
Description
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Affected products
34- Intel/Atom Processorsdescription
- osv-coords33 versionspkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/ucode-intel&distro=openSUSE%20Tumbleweedpkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/ucode-intel&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/ucode-intel&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/ucode-intel&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/ucode-intel&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/ucode-intel&distro=SUSE%20Manager%20Server%204.0pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/ucode-intel&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 20210525-lp152.2.17.1+ 32 more
- (no CPE)range: < 20210525-lp152.2.17.1
- (no CPE)range: < 20210525-7.1
- (no CPE)range: < 20210608-1.2
- (no CPE)range: < 1.17-102.83.71.1
- (no CPE)range: < 1.17-102.83.71.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.67.1
- (no CPE)range: < 20210525-3.67.1
- (no CPE)range: < 20210525-7.1
- (no CPE)range: < 20210525-7.1
- (no CPE)range: < 20210525-7.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-3.35.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-3.35.1
- (no CPE)range: < 20210525-3.67.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-3.203.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
- (no CPE)range: < 20210525-13.90.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.debian.org/security/2021/dsa-4934mitrevendor-advisoryx_refsource_DEBIAN
- cert-portal.siemens.com/productcert/pdf/ssa-309571.pdfmitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2021/07/msg00022.htmlmitremailing-listx_refsource_MLIST
- www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.