First published: Thu May 20 2021(Updated: )
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/intel-microcode | 3.20220510.1~deb10u1 3.20230808.1~deb10u1 3.20230808.1~deb11u1 3.20230808.1~deb12u1 3.20230808.1 | |
Intel Atom c3308 | ||
Intel Atom c3336 | ||
Intel Atom c3338 | ||
Intel Atom c3338r | ||
Intel Atom c3436l | ||
Intel Atom c3508 | ||
Intel Atom c3538 | ||
Intel Atom c3558 | ||
Intel Atom c3558r | ||
Intel Atom c3558rc | ||
Intel Atom c3708 | ||
Intel Atom c3750 | ||
Intel Atom c3758 | ||
Intel Atom c3758r | ||
Intel Atom c3808 | ||
Intel Atom c3830 | ||
Intel Atom c3850 | ||
Intel Atom c3858 | ||
Intel Atom c3950 | ||
Intel Atom c3955 | ||
Intel Atom c3958 | ||
Intel Atom p5942b | ||
Intel Atom x5-a3930 | ||
Intel Atom x5-a3940 | ||
Intel Atom x5-a3950 | ||
Intel Atom x5-a3960 | ||
Intel atom x6200fe | ||
Intel atom x6211e | ||
Intel atom x6212re | ||
Intel atom x6413e | ||
Intel atom x6425e | ||
Intel atom x6425re | ||
Intel atom x6427fe | ||
Intel Celeron j3355 | ||
Intel Celeron j3355e | ||
Intel Celeron j3455 | ||
Intel celeron j3455e | ||
Intel Celeron j4005 | ||
Intel Celeron j4025 | ||
Intel Celeron j4105 | ||
Intel Celeron j4125 | ||
Intel celeron j6413 | ||
Intel Celeron n3350 | ||
Intel Celeron n3350e | ||
Intel Celeron n3450 | ||
Intel Celeron n4000 | ||
Intel Celeron n4020 | ||
Intel Celeron n4100 | ||
Intel Celeron n4120 | ||
Intel celeron n6211 | ||
Intel core i3-l13g4 | ||
Intel core i5-l16g7 | ||
Intel p5921b | ||
Intel p5931b | ||
Intel p5962b | ||
Intel pentium j4205 | ||
Intel pentium j6425 | ||
Intel pentium n4200 | ||
Intel pentium n4200e | ||
Intel pentium n6415 | ||
Intel pentium silver j5005 | ||
Intel pentium silver j5040 | ||
Intel pentium silver n5000 | ||
Intel pentium silver n5030 | ||
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
siemens simatic drive controller firmware | ||
siemens simatic drive controller | ||
Siemens SIMATIC ET 200SP Open Controller firmware | <0209_0105 | |
siemens simatic et 200sp open controller | ||
siemens simatic ipc127e firmware | <21.01.07 | |
siemens simatic ipc127e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this Intel Atom processor vulnerability is CVE-2020-24513.
CVE-2020-24513 has a severity level of medium.
CVE-2020-24513 can reveal supervisor data in the L1 cache and the contents of recent stores on some Intel Atom processors.
The affected software versions include debian/intel-microcode:3.20220510.1~deb10u1, debian/intel-microcode:3.20230808.1~deb10u1, debian/intel-microcode:3.20230808.1~deb11u1, debian/intel-microcode:3.20230808.1~deb12u1, and debian/intel-microcode:3.20230808.1.
To fix CVE-2020-24513, update the intel-microcode package to the recommended versions provided by the vendor.