Описание
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 3.20240514.1 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20240514.0ubuntu0.18.04.1+esm1 |
esm-infra/focal | not-affected | 3.20240514.0ubuntu0.20.04.1 |
esm-infra/xenial | released | 3.20240514.0ubuntu0.16.04.1+esm1 |
focal | released | 3.20240514.0ubuntu0.20.04.1 |
jammy | released | 3.20240514.0ubuntu0.22.04.1 |
mantic | released | 3.20240514.0ubuntu0.23.10.1 |
noble | not-affected | 3.20240312.1build1 |
Показывать по
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Protection mechanism failure in some 3rd and 4th Generation Intel(R) X ...
Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с нарушением механизма защиты данных, позволяющая нарушителю повысить свои привилегии
EPSS
6.1 Medium
CVSS3