Description
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Related CPE's
o
fedoraproject
fedora
a
intel
sgx_dcap
a
intel
sgx_psw
a
intel
sgx_sdk
o
vmware
esxi
o
debian
debian_linux
References
http://www.openwall.com/lists/oss-security/2022/06/16/1
http://xenbits.xen.org/xsa/advisory-404.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://security.gentoo.org/glsa/202208-23
https://security.netapp.com/advisory/ntap-20220624-0008/
https://www.debian.org/security/2022/dsa-5173
https://www.debian.org/security/2022/dsa-5178
https://www.debian.org/security/2022/dsa-5184
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2022-06-15T20:15:17.547
3 years agoLast modified
2023-11-07T03:43:25.357
1 year ago