First published: Thu May 20 2021(Updated: )
Certain optimizations on some Intel processors target “trivial data value” cache-lines, such as all-zero value cache-lines. Such optimizations may lead to changes in cache-allocation or write-back behavior for such cache-lines. It may be possible for a local attacker to distinguish some cases of trivial-data-cache-lines from non-trivial-data cache-lines by inferring cache state using cache timing methods.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/intel-microcode | 3.20220510.1~deb10u1 3.20230808.1~deb10u1 3.20230808.1~deb11u1 3.20230808.1~deb12u1 3.20230808.1 | |
Intel Microcode | <20210608 | |
Debian Debian Linux | =10.0 | |
Netapp Fas\/aff Bios | ||
Netapp Hci Compute Node Bios | ||
Netapp Solidfire Bios |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-24512 is a vulnerability that allows an authenticated user to potentially enable information disclosure via local access on some Intel(R) Processors.
CVE-2020-24512 has a severity rating of low (3.3).
The affected software includes Intel Microcode, Debian Debian Linux 10.0, Netapp Fas/Aff Bios, Netapp Hci Compute Node Bios, and Netapp Solidfire Bios.
To fix CVE-2020-24512, update to the recommended versions of the affected software listed in the references.