First published: Thu May 20 2021(Updated: )
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/intel-microcode | 3.20220510.1~deb10u1 3.20230808.1~deb10u1 3.20230808.1~deb11u1 3.20230808.1~deb12u1 3.20230808.1 | |
Intel Atom C3308 | ||
Intel Atom C3336 | ||
Intel Atom C3338 | ||
Intel Atom C3338r | ||
Intel Atom C3436l | ||
Intel Atom C3508 | ||
Intel Atom C3538 | ||
Intel Atom C3558 | ||
Intel Atom C3558r | ||
Intel Atom C3558rc | ||
Intel Atom C3708 | ||
Intel Atom C3750 | ||
Intel Atom C3758 | ||
Intel Atom C3758r | ||
Intel Atom C3808 | ||
Intel Atom C3830 | ||
Intel Atom C3850 | ||
Intel Atom C3858 | ||
Intel Atom C3950 | ||
Intel Atom C3955 | ||
Intel Atom C3958 | ||
Intel Atom P5942b | ||
Intel Atom X5-a3930 | ||
Intel Atom X5-a3940 | ||
Intel Atom X5-a3950 | ||
Intel Atom X5-a3960 | ||
Intel Atom X6200fe | ||
Intel Atom X6211e | ||
Intel Atom X6212re | ||
Intel Atom X6413e | ||
Intel Atom X6425e | ||
Intel Atom X6425re | ||
Intel Atom X6427fe | ||
Intel Celeron J3355 | ||
Intel Celeron J3355e | ||
Intel Celeron J3455 | ||
Intel Celeron J3455e | ||
Intel Celeron J4005 | ||
Intel Celeron J4025 | ||
Intel Celeron J4105 | ||
Intel Celeron J4125 | ||
Intel Celeron J6413 | ||
Intel Celeron N3350 | ||
Intel Celeron N3350e | ||
Intel Celeron N3450 | ||
Intel Celeron N4000 | ||
Intel Celeron N4020 | ||
Intel Celeron N4100 | ||
Intel Celeron N4120 | ||
Intel Celeron N6211 | ||
Intel Core I3-l13g4 | ||
Intel Core I5-l16g7 | ||
Intel P5921b | ||
Intel P5931b | ||
Intel P5962b | ||
Intel Pentium J4205 | ||
Intel Pentium J6425 | ||
Intel Pentium N4200 | ||
Intel Pentium N4200e | ||
Intel Pentium N6415 | ||
Intel Pentium Silver J5005 | ||
Intel Pentium Silver J5040 | ||
Intel Pentium Silver N5000 | ||
Intel Pentium Silver N5030 | ||
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Siemens Simatic Drive Controller Firmware | ||
Siemens Simatic Drive Controller | ||
Siemens Simatic Et 200sp Open Controller Firmware | <0209_0105 | |
Siemens Simatic Et 200sp Open Controller | ||
Siemens Simatic Ipc127e Firmware | <21.01.07 | |
Siemens Simatic Ipc127e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this Intel Atom processor vulnerability is CVE-2020-24513.
CVE-2020-24513 has a severity level of medium.
CVE-2020-24513 can reveal supervisor data in the L1 cache and the contents of recent stores on some Intel Atom processors.
The affected software versions include debian/intel-microcode:3.20220510.1~deb10u1, debian/intel-microcode:3.20230808.1~deb10u1, debian/intel-microcode:3.20230808.1~deb11u1, debian/intel-microcode:3.20230808.1~deb12u1, and debian/intel-microcode:3.20230808.1.
To fix CVE-2020-24513, update the intel-microcode package to the recommended versions provided by the vendor.