Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
debian_linux | eq | 11.0 | |
fedora | eq | 35 | |
fedora | eq | 36 | |
sgx_dcap | lt | 1.14.100.3 | |
sgx_dcap | lt | 1.14.100.3 | |
sgx_psw | lt | 2.17.100.3 | |
sgx_psw | lt | 2.16.100.3 | |
sgx_sdk | lt | 2.17.100.3 |
www.openwall.com/lists/oss-security/2022/06/16/1
xenbits.xen.org/xsa/advisory-404.html
lists.debian.org/debian-lts-announce/2022/07/msg00000.html
lists.fedoraproject.org/archives/list/[email protected]/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
lists.fedoraproject.org/archives/list/[email protected]/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
lists.fedoraproject.org/archives/list/[email protected]/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
lists.fedoraproject.org/archives/list/[email protected]/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
security.gentoo.org/glsa/202208-23
security.netapp.com/advisory/ntap-20220624-0008/
www.debian.org/security/2022/dsa-5173
www.debian.org/security/2022/dsa-5178
www.debian.org/security/2022/dsa-5184
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html