CVE-2020-0543

Source
https://cve.org/CVERecord?id=CVE-2020-0543
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-0543.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-0543
Downstream
Related
Published
2020-06-15T14:15:11.207Z
Modified
2026-02-24T08:13:34.949467Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

References

Affected packages

Git / github.com/mariadb-corporation/mariadb-connector-c

Affected ranges

Type
GIT
Repo
https://github.com/mariadb-corporation/mariadb-connector-c
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

vanir_signatures
[
    {
        "digest": {
            "length": 1819.0,
            "function_hash": "284830269013157089374160329977803372579"
        },
        "source": "https://github.com/mariadb-corporation/mariadb-connector-c/commit/bb1a67173ea1c8ba348c163a54a571b430672871",
        "deprecated": false,
        "id": "CVE-2020-0543-62fb5120",
        "signature_type": "Function",
        "target": {
            "function": "mysql_stmt_execute",
            "file": "libmariadb/mariadb_stmt.c"
        },
        "signature_version": "v1"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "118590500306614426998123651001814940301",
                "140395585539293977189444924934604086737",
                "161879616918542924518737862873970030789",
                "233068249652541142133516152063998488551",
                "309490533491633245232581759922554604729"
            ]
        },
        "source": "https://github.com/mariadb-corporation/mariadb-connector-c/commit/bb1a67173ea1c8ba348c163a54a571b430672871",
        "deprecated": false,
        "id": "CVE-2020-0543-ab833daa",
        "signature_type": "Line",
        "target": {
            "file": "libmariadb/mariadb_stmt.c"
        },
        "signature_version": "v1"
    },
    {
        "digest": {
            "length": 1780.0,
            "function_hash": "27569737362258991885236303183695474039"
        },
        "source": "https://github.com/mariadb-corporation/mariadb-connector-c/commit/bb1a67173ea1c8ba348c163a54a571b430672871",
        "deprecated": false,
        "id": "CVE-2020-0543-d260abcd",
        "signature_type": "Function",
        "target": {
            "function": "test_codbc138",
            "file": "unittest/libmariadb/ps_bugs.c"
        },
        "signature_version": "v1"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "116590681211922582443822458270214714669",
                "194426848790957923102552870401929149927",
                "183213282579442233411901610466867557486",
                "280081013569296466082992134722691064633",
                "238693492402197662842304162475780306817",
                "10667106536453794341389827938503577287",
                "72922800478488947253428537301117528951",
                "195406425906347784758343850408397455754",
                "302625900654928043494494987028813520724"
            ]
        },
        "source": "https://github.com/mariadb-corporation/mariadb-connector-c/commit/bb1a67173ea1c8ba348c163a54a571b430672871",
        "deprecated": false,
        "id": "CVE-2020-0543-f80828c6",
        "signature_type": "Line",
        "target": {
            "file": "unittest/libmariadb/ps_bugs.c"
        },
        "signature_version": "v1"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-0543.json"