Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with
high privileges to cause a guest to observe an incorrect TSC when Secure
TSC is enabled potentially resulting in a loss of guest integrity.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux-firmware | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-firmware | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-firmware | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-firmware | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-firmware | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-firmware | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-firmware | < any | UNKNOWN |