CVE-2022-26373

NameCVE-2022-26373
DescriptionNon-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3102-1, DLA-3131-1, DSA-5207-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)buster4.19.249-2vulnerable
buster (security)4.19.282-1fixed
bullseye5.10.178-3fixed
bullseye (security)5.10.179-1fixed
bookworm, sid6.1.27-1fixed
linux-5.10 (PTS)buster (security)5.10.179-1~deb10u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebuster4.19.260-1DLA-3131-1
linuxsourcebullseye5.10.136-1DSA-5207-1
linuxsource(unstable)5.18.16-1
linux-5.10sourcebuster5.10.136-1~deb10u1DLA-3102-1

Notes

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
https://git.kernel.org/linus/2b1299322016731d56807aa49254a5ea3080b6b3
https://git.kernel.org/linus/ba6e31af2be96c4d0536f2152ed6f7b6c11bca47

Search for package or bug name: Reporting problems