CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
10.3%
Information exposure through microarchitectural state after transient execution from some register files for some Intelยฎ Atomยฎ Processors may allow an authenticated user to potentially enable information disclosure via local access.
[
{
"vendor": "n/a",
"product": "Intel(R) Atom(R) Processors",
"versions": [
{
"version": "See references",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]
www.openwall.com/lists/oss-security/2024/03/12/13
lists.debian.org/debian-lts-announce/2024/05/msg00003.html
lists.debian.org/debian-lts-announce/2024/06/msg00017.html
lists.fedoraproject.org/archives/list/[email protected]/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
lists.fedoraproject.org/archives/list/[email protected]/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
lists.fedoraproject.org/archives/list/[email protected]/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
More