Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
The product does not properly “clean up” and remove temporary or supporting resources after they have been used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | * | * |
Intel-microcode | Ubuntu | bionic | * |
Intel-microcode | Ubuntu | devel | * |
Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * |
Intel-microcode | Ubuntu | esm-infra/xenial | * |
Intel-microcode | Ubuntu | focal | * |
Intel-microcode | Ubuntu | impish | * |
Intel-microcode | Ubuntu | jammy | * |
Intel-microcode | Ubuntu | kinetic | * |
Intel-microcode | Ubuntu | trusty/esm | * |
Intel-microcode | Ubuntu | upstream | * |