Описание
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
intel-microcode | fixed | 3.20220510.1 | package | |
intel-microcode | no-dsa | bullseye | package | |
linux | fixed | 5.18.5-1 | package | |
linux | fixed | 5.10.127-1 | bullseye | package |
xen | fixed | 4.16.2-1 | package | |
xen | end-of-life | buster | package |
Примечания
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDS
Linux kernel documentation patch: https://git.kernel.org/linus/4419470191386456e0b8ed4eb06a70b0021798a6
https://xenbits.xen.org/xsa/advisory-404.html
EPSS
Связанные уязвимости
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
EPSS