Описание
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
intel-microcode | fixed | 3.20240514.1 | package | |
intel-microcode | fixed | 3.20240514.1~deb12u1 | bookworm | package |
intel-microcode | fixed | 3.20240514.1~deb11u1 | bullseye | package |
intel-microcode | postponed | buster | package |
Примечания
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
EPSS
Связанные уязвимости
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Уязвимость микропрограммного обеспечения процессоров Intel Core Ultra, связанная с блокировкой процессора, позволяющая нарушителю вызвать отказ в обслуживании
EPSS