Описание
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was deferred |
| devel | not-affected | see Notes |
| esm-infra-legacy/trusty | not-affected | see Notes |
| esm-infra/bionic | not-affected | see Notes |
| esm-infra/focal | not-affected | see Notes |
| esm-infra/xenial | not-affected | see Notes |
| focal | ignored | end of standard support, was deferred |
| hirsute | ignored | end of life |
| impish | ignored | end of life |
| jammy | not-affected | see Notes |
Показывать по
1.9 Low
CVSS2
4.7 Medium
CVSS3
Связанные уязвимости
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
Уязвимость микропрограммного обеспечения процессоров AMD, связанная с использованием инструкций x86 PREFETCH, позволяющая нарушителю раскрыть информацию об адресном пространстве ядра
1.9 Low
CVSS2
4.7 Medium
CVSS3