Upstream information
Description
SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database |
|---|---|
| Base Score | 7.9 |
| Vector | AV:A/AC:M/Au:N/C:C/I:C/A:C |
| Access Vector | Adjacent Network |
| Access Complexity | Medium |
| Authentication | None |
| Confidentiality Impact | Complete |
| Integrity Impact | Complete |
| Availability Impact | Complete |
| CVSS detail | National Vulnerability Database |
|---|---|
| Base Score | 8.3 |
| Vector | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Attack Vector | Adjacent Network |
| Attack Complexity | High |
| Privileges Required | None |
| User Interaction | None |
| Scope | Changed |
| Confidentiality Impact | High |
| Integrity Impact | High |
| Availability Impact | High |
| CVSSv3 Version | 3.1 |
Note from the SUSE Security Team
This issue needs to be fixed by the DRAM and chipset vendors. Unfortunately no Operating System mitigation is possible. SUSE Bugzilla entry: 1192782 [RESOLVED / INVALID] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Tue Nov 16 23:00:17 2021CVE page last modified: Tue Dec 16 19:56:51 2025