CVE-2022-40982

Name
CVE-2022-40982
Description
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
MISC https://downfall.page
MISC https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
MISC https://access.redhat.com/solutions/7027704
MISC https://xenbits.xen.org/xsa/advisory-435.html
MISC https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
MISC https://security.netapp.com/advisory/ntap-20230811-0001/
MISC https://www.debian.org/security/2023/dsa-5475
MISC https://www.debian.org/security/2023/dsa-5474
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
MISC https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* enterprise_linux == None == 7.0
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:* xen == None == -
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* enterprise_linux == None == 6.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* enterprise_linux == None == 8.0
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* enterprise_linux == None == 9.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status