Описание
Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 3.20230214.0ubuntu0.18.04.1 |
| devel | released | 3.20230214.0ubuntu1 |
| esm-infra-legacy/trusty | ignored | trusty doesn't support runtime microcode loading |
| esm-infra/bionic | released | 3.20230214.0ubuntu0.18.04.1 |
| esm-infra/focal | released | 3.20230214.0ubuntu0.20.04.1 |
| esm-infra/xenial | released | 3.20230214.0ubuntu0.16.04.1+esm1 |
| focal | released | 3.20230214.0ubuntu0.20.04.1 |
| jammy | released | 3.20230214.0ubuntu0.22.04.1 |
| kinetic | released | 3.20230214.0ubuntu0.22.10.1 |
| trusty | ignored | end of standard support |
Показывать по
6.1 Medium
CVSS3
Связанные уязвимости
Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access.
Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access.
Incorrect calculation in microcode keying mechanism for some 3rd Gener ...
6.1 Medium
CVSS3