First published: Wed May 25 2022(Updated: )
A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to enable information disclosure via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.76.1.rt56.1220.el7 | 0:3.10.0-1160.76.1.rt56.1220.el7 |
redhat/kernel | <0:3.10.0-1160.76.1.el7 | 0:3.10.0-1160.76.1.el7 |
redhat/kernel-rt | <0:4.18.0-372.26.1.rt7.183.el8_6 | 0:4.18.0-372.26.1.rt7.183.el8_6 |
redhat/kernel | <0:4.18.0-372.26.1.el8_6 | 0:4.18.0-372.26.1.el8_6 |
redhat/kernel | <0:4.18.0-147.76.1.el8_1 | 0:4.18.0-147.76.1.el8_1 |
redhat/kernel | <0:4.18.0-193.93.1.el8_2 | 0:4.18.0-193.93.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-193.93.1.rt13.143.el8_2 | 0:4.18.0-193.93.1.rt13.143.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.65.1.rt7.137.el8_4 | 0:4.18.0-305.65.1.rt7.137.el8_4 |
redhat/kernel | <0:4.18.0-305.65.1.el8_4 | 0:4.18.0-305.65.1.el8_4 |
redhat/kernel | <0:5.14.0-162.6.1.el9_1 | 0:5.14.0-162.6.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.6.1.rt21.168.el9_1 | 0:5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel | <0:5.14.0-70.36.1.el9_0 | 0:5.14.0-70.36.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.36.1.rt21.108.el9_0 | 0:5.14.0-70.36.1.rt21.108.el9_0 |
Xen Xen | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Intel Sgx Dcap | <1.14.100.3 | |
Intel Sgx Dcap | <1.14.100.3 | |
Intel Sgx Psw | <2.16.100.3 | |
Intel Sgx Psw | <2.17.100.3 | |
Intel Sgx Sdk | <2.16.100.3 | |
Intel Sgx Sdk | <2.17.100.3 | |
VMware ESXi | =7.0 | |
VMware ESXi | =7.0-beta | |
VMware ESXi | =7.0-update_1 | |
VMware ESXi | =7.0-update_1a | |
VMware ESXi | =7.0-update_1b | |
VMware ESXi | =7.0-update_1c | |
VMware ESXi | =7.0-update_1d | |
VMware ESXi | =7.0-update_2 | |
VMware ESXi | =7.0-update_2a | |
VMware ESXi | =7.0-update_2c | |
VMware ESXi | =7.0-update_2d | |
VMware ESXi | =7.0-update_3c | |
VMware ESXi | =7.0-update_3d | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/intel-microcode | 3.20240813.1~deb11u1 3.20241112.1~deb11u1 3.20240910.1~deb12u1 3.20231114.1~deb12u1 3.20241112.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.6-1 6.12.8-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.17.3+36-g54dacb5c02-1 4.19.1-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)