CVE-2020-0543 log

Source
Severity High
Remote No
Type Information disclosure
Description
A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.
Group Package Affected Fixed Severity Status Ticket
AVG-1187 intel-ucode 20200520-1 20200609-1 High Fixed
Date Advisory Group Package Severity Type
13 Jun 2020 ASA-202006-10 AVG-1187 intel-ucode High information disclosure
References
https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling
https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri