Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-21127

Опубликовано: 15 июн. 2022
Источник: debian
EPSS Низкий

Описание

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
intel-microcodefixed3.20220510.1package
intel-microcodeno-dsabullseyepackage

Примечания

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html

  • https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SRBDS-Update

  • https://xenbits.xen.org/xsa/advisory-404.html

EPSS

Процентиль: 51%
0.00278
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 4 года назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
redhat
почти 4 года назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.5
nvd
почти 4 года назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

msrc
почти 4 года назад

Intel: CVE-2022-21127 Special Register Buffer Data Sampling Update (SRBDS Update)

CVSS3: 5.5
github
почти 4 года назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

EPSS

Процентиль: 51%
0.00278
Низкий