Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-21127

Опубликовано: 15 июн. 2022
Источник: debian
EPSS Низкий

Описание

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
intel-microcodefixed3.20220510.1package
intel-microcodeno-dsabullseyepackage

Примечания

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html

  • https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SRBDS-Update

  • https://xenbits.xen.org/xsa/advisory-404.html

EPSS

Процентиль: 49%
0.00253
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 3 лет назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
redhat
около 3 лет назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.5
nvd
около 3 лет назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

msrc
около 3 лет назад

Intel: CVE-2022-21127 Special Register Buffer Data Sampling Update (SRBDS Update)

CVSS3: 5.5
github
около 3 лет назад

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

EPSS

Процентиль: 49%
0.00253
Низкий