CVE-2020-12912 PUBLISHED

A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.

EPSS 0.84% · 74.6th percentile

Risk Scores

EPSS Score
0.84%
74.6th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlinux-oracle-5.05.0.0-1014.19, 0, 5.0.0-1007.12~18.04.1
Ubuntu:18.04:LTSlinux-azure-5.35.3.0-1022.23~18.04.1, 5.3.0-1012.13~18.04.1, 5.3.0-1013.14~18.04.1
Ubuntu:18.04:LTSlinux-aws-5.35.3.0-1034.36, 5.3.0-1035.37, 5.3.0-1028.30~18.04.1
Ubuntu:Pro:14.04:LTSlinux-aws4.4.0-1098.103, 4.4.0-1099.104, 4.4.0-1101.106
Ubuntu:20.04:LTSlinux-hwe-5.85.8.0-33.36~20.04.1, 5.8.0-31.33~20.04.1, 5.8.0-29.31~20.04.1
Ubuntu:18.04:LTSlinux-azure4.15.0-1030.31, 4.15.0-1028.29, 4.15.0-1025.26
Ubuntu:18.04:LTSlinux-oracle-5.35.3.0-1030.32~18.04.1, 5.3.0-1028.30~18.04.1, 5.3.0-1027.29~18.04.1
Ubuntu:18.04:LTSlinux-azure-edge0, 4.18.0-1006.6~18.04.1, 4.18.0-1007.7~18.04.1
Ubuntu:Pro:14.04:LTSlinux3.13.0-107.154, 3.11.0-12.19, 3.12.0-1.3
Ubuntu:18.04:LTSlinux-gcp-edge5.0.0-1011.11~18.04.1, 4.18.0-1015.16~18.04.1, 4.18.0-1013.14~18.04.1
Ubuntu:18.04:LTSlinux-hwe-edge5.3.0-22.24~18.04.1, 5.0.0-20.21~18.04.1, 5.0.0-19.20~18.04.1
Ubuntu:Pro:14.04:LTSlinux-lts-xenial4.4.0-64.85~14.04.1, 4.4.0-66.87~14.04.1, 4.4.0-67.88~14.04.1
Ubuntu:18.04:LTSlinux-gcp-5.35.3.0-1008.9~18.04.1, 5.3.0-1032.34~18.04.1, 5.3.0-1030.32~18.04.1
Ubuntu:18.04:LTSlinux-aws-5.05.0.0-1021.24~18.04.1, 5.0.0-1022.25~18.04.1, 5.0.0-1023.26~18.04.1
Ubuntu:18.04:LTSlinux-hwe5.3.0-46.38~18.04.1, 0, 4.18.0-13.14~18.04.1
Ubuntu:Pro:14.04:LTSlinux-azure4.15.0-1123.136~14.04.1, 4.15.0-1122.135~14.04.1, 4.15.0-1121.134~14.04.1
Ubuntu:18.04:LTSlinux-gcp4.15.0-1005.5, 4.15.0-1006.6, 4.15.0-1008.8
Ubuntu:16.04:LTSlinux-hwe-edge4.8.0-28.30~16.04.1, 0, 4.15.0-23.25~16.04.1

Timeline

References

Open in Interactive Console →