Improper access control for some 3rd Generation Intel(R) Xeon(R) Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Bios | Intel | * | mr7 (excluding) | 
| Intel-microcode | Ubuntu | bionic | * | 
| Intel-microcode | Ubuntu | devel | * | 
| Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * | 
| Intel-microcode | Ubuntu | esm-infra/bionic | * | 
| Intel-microcode | Ubuntu | esm-infra/focal | * | 
| Intel-microcode | Ubuntu | esm-infra/xenial | * | 
| Intel-microcode | Ubuntu | focal | * | 
| Intel-microcode | Ubuntu | impish | * | 
| Intel-microcode | Ubuntu | jammy | * | 
| Intel-microcode | Ubuntu | kinetic | * | 
| Intel-microcode | Ubuntu | trusty/esm | * | 
| Intel-microcode | Ubuntu | upstream | * |