CVE-2020-12912 - log back

CVE-2020-12912 edited at 01 Dec 2020 11:25:21
References
- https://lore.kernel.org/linux-hwmon/20201112172159.8781-1-nchatrad@amd.com/
+ https://www.amd.com/en/corporate/product-security
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=60268b0e8258fdea9a3c9f4b51e161c123571db3
CVE-2020-12912 edited at 26 Nov 2020 09:48:08
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Private key recovery
Description
+ A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
References
+ https://lore.kernel.org/linux-hwmon/20201112172159.8781-1-nchatrad@amd.com/
Notes
CVE-2020-12912 created at 26 Nov 2020 09:45:11