{"id":"CVE-2020-8698","details":"Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","modified":"2026-03-13T00:47:09.980764Z","published":"2020-11-12T18:15:16.783Z","related":["MGASA-2020-0422","MGASA-2021-0140","SUSE-SU-2020:14540-1","SUSE-SU-2020:14546-1","SUSE-SU-2020:3271-1","SUSE-SU-2020:3274-1","SUSE-SU-2020:3275-1","SUSE-SU-2020:3276-1","SUSE-SU-2020:3279-1","SUSE-SU-2020:3372-1","SUSE-SU-2020:3373-1","SUSE-SU-2020:3374-1","SUSE-SU-2020:3457-1","SUSE-SU-2020:3514-1","openSUSE-SU-2020:2075-1","openSUSE-SU-2020:2098-1","openSUSE-SU-2024:11478-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20201113-0006/"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8698.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"fixed":"22.01.08"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.15"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.15"}]},{"events":[{"introduced":"0"},{"fixed":"21.01.15"}]},{"events":[{"introduced":"0"},{"fixed":"25.02.08"}]},{"events":[{"introduced":"0"},{"fixed":"25.02.08"}]},{"events":[{"introduced":"0"},{"fixed":"25.02.08"}]},{"events":[{"introduced":"0"},{"fixed":"25.02.08"}]},{"events":[{"introduced":"0"},{"fixed":"23.01.08"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}