Latest intel core i3-6320t Vulnerabilities

Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)
redhat/kernel-rt<0:3.10.0-1160.80.1.rt56.1225.el7
redhat/kernel<0:3.10.0-1160.80.1.el7
redhat/kernel-rt<0:4.18.0-372.32.1.rt7.189.el8_6
redhat/kernel<0:4.18.0-372.32.1.el8_6
redhat/kernel<0:5.14.0-162.6.1.el9_1
redhat/kernel-rt<0:5.14.0-162.6.1.rt21.168.el9_1
and 669 more
Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical ac...
Intel Celeron G5205u Firmware
Intel Celeron G5205u
Intel Celeron G5305u Firmware
Intel Celeron G5305u
Intel Celeron G5900 Firmware
Intel Celeron G5900
and 912 more
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Core I7-8510y Firmware
Intel Core I7-8510y
Intel Core I7-8500y Firmware
Intel Core I7-8500y
Intel Core I5-8310y Firmware
Intel Core I5-8310y
and 592 more
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Microcode
Intel Celeron 3855u
Intel Celeron 3865u
Intel Celeron 3955u
Intel Celeron 3965u
Intel Celeron 3965y
and 496 more
A vulnerability was found in Intel's implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX e...
Intel Core I7-8510y Firmware
Intel Core I7-8510y
Intel Core I7-8500y Firmware
Intel Core I7-8500y
Intel Core I5-8310y Firmware
Intel Core I5-8310y
and 596 more
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
ubuntu/intel-microcode<3.20200609.0ubuntu0.18.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.19.10.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.20.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.20.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.14.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.16.04.0
and 781 more
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The ...
Intel Atom C2308
Intel Atom C2316
Intel Atom C2338
Intel Atom C2350
Intel Atom C2358
Intel Atom C2508
and 1315 more
Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
ubuntu/intel-microcode<3.20200609.0ubuntu0.18.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.19.10.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.20.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.20.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.14.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.16.04.0
and 1720 more
Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
ubuntu/intel-microcode<3.20200609.0ubuntu0.18.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.19.10.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.20.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.20.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.14.04.0
ubuntu/intel-microcode<3.20200609.0ubuntu0.16.04.0
and 1709 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203