Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-0551
HistoryMar 10, 2020 - 12:00 a.m.

CVE-2020-0551

2020-03-1000:00:00
ubuntu.com
ubuntu.com
6

0.0004 Low

EPSS

Percentile

12.2%

Load value injection in some Intelยฎ Processors utilizing speculative
execution may allow an authenticated user to potentially enable information
disclosure via a side channel with local access. The list of affected
products is provided in intel-sa-00334:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html

Notes

Author Note
sbeattie only affects processors from Intel primary impact is for SGX users. May need toolchain updates for applications that are targeted for use in SGX enclaves. most Ubuntu kernels do not support or have SGX drivers available, and so are not affected. The linux-azure kernels do have SGX enabled (as of https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1844245 ) and thus the Ubuntu Kernel team is investigating further. The guidance that we have received so far from Intel indicates that it is only SGX applications that need mitigations. looking at the upstream intel SGX DCAP driver as of 2020-11-17, there does not seem to have been any changes due to this issue, so it is only software running in the enclave itself that is affected; marking linux-azure kernels as not-affected.

0.0004 Low

EPSS

Percentile

12.2%