CVE-2020-8696
Published: 10 November 2020
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
From the Ubuntu Security Team
Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information.
Priority
Status
Package | Release | Status |
---|---|---|
intel-microcode Launchpad, Ubuntu, Debian |
bionic |
Released
(3.20201110.0ubuntu0.18.04.1)
|
eoan |
Ignored
(reached end-of-life)
|
|
focal |
Released
(3.20201110.0ubuntu0.20.04.1)
|
|
groovy |
Released
(3.20201110.0ubuntu0.20.10.1)
|
|
trusty |
Released
(3.20201110.0ubuntu0.14.04.1)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(3.20201110.0ubuntu0.16.04.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 2.8 |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N |