Описание
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | released | 3.20231114.0ubuntu1 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20231114.0ubuntu0.18.04.1+esm1 |
esm-infra/focal | not-affected | 3.20231114.0ubuntu0.20.04.1 |
esm-infra/xenial | released | 3.20231114.0ubuntu0.16.04.1+esm1 |
focal | released | 3.20231114.0ubuntu0.20.04.1 |
jammy | released | 3.20231114.0ubuntu0.22.04.1 |
lunar | released | 3.20231114.0ubuntu0.23.04.1 |
mantic | released | 3.20231114.0ubuntu0.23.10.1 |
Показывать по
Ссылки на источники
EPSS
8.8 High
CVSS3
Связанные уязвимости
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Sequence of processor instructions leads to unexpected behavior for so ...
EPSS
8.8 High
CVSS3