Описание
Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
intel-microcode | fixed | 3.20240514.1 | package | |
intel-microcode | fixed | 3.20240514.1~deb12u1 | bookworm | package |
intel-microcode | fixed | 3.20240514.1~deb11u1 | bullseye | package |
Примечания
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/80#issuecomment-2293839986
Issue was already fixed in the 20240514 release.
EPSS
Связанные уязвимости
Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
Уязвимость механизма кэширования потоков микропрограммного обеспечения процессоров Intel , позволяющая нарушителю повысить свои привилегии
EPSS