{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-12965","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","assignerShortName":"AMD","dateUpdated":"2024-09-16T22:40:10.602Z","dateReserved":"2020-05-15T00:00:00.000Z","datePublished":"2022-02-04T22:29:13.634Z"},"containers":{"cna":{"datePublic":"2021-08-10T00:00:00.000Z","providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2023-12-06T03:06:18.982Z"},"descriptions":[{"lang":"en","value":"When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage."}],"affected":[{"vendor":"AMD","product":"All supported processors","versions":[{"version":"unspecified","lessThan":"undefined","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010"},{"name":"[oss-security] 20231205 SLAM: Spectre based on Linear Address Masking","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/3"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"TBD"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"AMD-SB-1010","discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:11:19.033Z"},"title":"CVE Program Container","references":[{"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1010","tags":["x_transferred"]},{"name":"[oss-security] 20231205 SLAM: Spectre based on Linear Address Masking","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/3"}]}]}}