Описание
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 3.20230214.0ubuntu0.18.04.1 |
| devel | released | 3.20230214.0ubuntu1 |
| esm-infra-legacy/trusty | ignored | trusty doesn't support runtime microcode loading |
| esm-infra/bionic | released | 3.20230214.0ubuntu0.18.04.1 |
| esm-infra/focal | released | 3.20230214.0ubuntu0.20.04.1 |
| esm-infra/xenial | released | 3.20230214.0ubuntu0.16.04.1+esm1 |
| focal | released | 3.20230214.0ubuntu0.20.04.1 |
| jammy | released | 3.20230214.0ubuntu0.22.04.1 |
| kinetic | released | 3.20230214.0ubuntu0.22.10.1 |
| trusty | ignored | end of standard support |
Показывать по
6 Medium
CVSS3
Связанные уязвимости
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.
Improper isolation of shared resources in some Intel(R) Processors whe ...
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.
Уязвимость расширения Intel Software Guard процессоров Intel Microcode, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
6 Medium
CVSS3