Описание
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20240514.1 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20240514.0ubuntu0.18.04.1+esm1 |
esm-infra/focal | not-affected | 3.20240514.0ubuntu0.20.04.1 |
esm-infra/xenial | released | 3.20240514.0ubuntu0.16.04.1+esm1 |
focal | released | 3.20240514.0ubuntu0.20.04.1 |
jammy | released | 3.20240514.0ubuntu0.22.04.1 |
mantic | released | 3.20240514.0ubuntu0.23.10.1 |
noble | released | 3.20240514.0ubuntu0.24.04.1 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support early microcode loading at runtime] |
Показывать по
EPSS
4.7 Medium
CVSS3
Связанные уязвимости
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Sequence of processor instructions leads to unexpected behavior in Int ...
Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
Уязвимость микропрограммного обеспечения процессоров Intel Core Ultra, связанная с блокировкой процессора, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
4.7 Medium
CVSS3