{"id":"CVE-2022-40982","details":"Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.","modified":"2026-03-13T05:58:48.323092Z","published":"2023-08-11T03:15:14.823Z","related":["ALSA-2023:7077","MGASA-2023-0249","MGASA-2023-0250","MGASA-2023-0251","SUSE-SU-2023:3289-1","SUSE-SU-2023:3302-1","SUSE-SU-2023:3309-1","SUSE-SU-2023:3311-1","SUSE-SU-2023:3313-1","SUSE-SU-2023:3318-1","SUSE-SU-2023:3324-1","SUSE-SU-2023:3329-1","SUSE-SU-2023:3333-1","SUSE-SU-2023:3349-1","SUSE-SU-2023:3359-1","SUSE-SU-2023:3376-1","SUSE-SU-2023:3377-1","SUSE-SU-2023:3382-1","SUSE-SU-2023:3383-1","SUSE-SU-2023:3390-1","SUSE-SU-2023:3391-1","SUSE-SU-2023:3392-1","SUSE-SU-2023:3395-1","SUSE-SU-2023:3421-1","SUSE-SU-2023:3446-1","SUSE-SU-2023:3447-1","SUSE-SU-2023:3494-1","SUSE-SU-2023:3495-1","SUSE-SU-2023:3496-1","SUSE-SU-2023:3894-1","SUSE-SU-2023:3895-1","SUSE-SU-2023:3902-1","SUSE-SU-2025:1032-1","openSUSE-SU-2024:13112-1","openSUSE-SU-2024:13115-1","openSUSE-SU-2024:13122-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"},{"type":"ADVISORY","url":"https://access.redhat.com/solutions/7027704"},{"type":"ADVISORY","url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230811-0001/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5474"},{"type":"ADVISORY","url":"https://xenbits.xen.org/xsa/advisory-435.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-435.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5475"},{"type":"EVIDENCE","url":"https://downfall.page"},{"type":"EVIDENCE","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"fixed":"20230808"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40982.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}