Improper access control for some 3rd Generation Intel(R) Xeon(R) Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bios | Intel | * | mr7 (excluding) |
Intel-microcode | Ubuntu | bionic | * |
Intel-microcode | Ubuntu | devel | * |
Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * |
Intel-microcode | Ubuntu | esm-infra/xenial | * |
Intel-microcode | Ubuntu | focal | * |
Intel-microcode | Ubuntu | impish | * |
Intel-microcode | Ubuntu | jammy | * |
Intel-microcode | Ubuntu | kinetic | * |
Intel-microcode | Ubuntu | trusty/esm | * |
Intel-microcode | Ubuntu | upstream | * |