Home CVE Database CVE-2020-0543

CVE-2020-0543

Description

Certain microprocessor operations (including RDRAND and RDSEED) are implemented using micro-architecture specific Special Register Reads (SRR). On certain client and E3 processors, the data returned by these SRR operations may be inferred, even on another core. Cleanup errors from specific special register read operations may allow an authenticated user to potentially enable information disclosure via local access.

Priority: LOW
CVSS v3: 5.5
Publish Date: Jun 14, 2020
Related ID: --
CVSS v2: MEDIUM
Modified Date: Jun 14, 2020

Find out more about CVE-2020-0543 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Vulnerable LIN10-7434
-- --
Wind River Linux 8 Fixed LIN8-12545
8.0.0.34 --
Wind River Linux 9 Fixed LIN9-10034
9.0.0.26 --
Wind River Linux 7 Requires LTSS -- -- --
Wind River Linux LTS 21 Won't Fix -- -- --
Wind River Linux LTS 18 Vulnerable LIN1018-6304
-- --
Wind River Linux LTS 19 Vulnerable LIN1019-4829
-- --
Wind River Linux CD release Vulnerable -- -- --
VxWorks
VxWorks 7 Not Vulnerable -- -- --
VxWorks 6.9 Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Comments

intel SRBDS


Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online