Описание
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | fixed | 6.4.4-3 | package | |
intel-microcode | fixed | 3.20230808.1 | package |
Примечания
https://www.openwall.com/lists/oss-security/2023/08/08/5
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808
https://downfall.page/
EPSS
Связанные уязвимости
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
ELSA-2023-12786: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2023-12785: Unbreakable Enterprise kernel-container security update (IMPORTANT)
EPSS