Описание
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20241112.1ubuntu2 |
esm-infra-legacy/trusty | ignored | trusty doesn't support late loading of microcode |
esm-infra/bionic | released | 3.20241112.0ubuntu0.18.04.1+esm1 |
esm-infra/focal | not-affected | 3.20241112.0ubuntu0.20.04.1 |
esm-infra/xenial | released | 3.20241112.0ubuntu0.16.04.1+esm1 |
focal | released | 3.20241112.0ubuntu0.20.04.1 |
jammy | released | 3.20241112.0ubuntu0.22.04.1 |
noble | released | 3.20241112.0ubuntu0.24.04.1 |
oracular | released | 3.20241112.0ubuntu0.24.10.1 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support late loading of microcode] |
Показывать по
EPSS
8.8 High
CVSS3
Связанные уязвимости
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Improper conditions check in some Intel(R) Xeon(R) processor memory co ...
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость микропрограммного обеспечения процессоров Intel Xeon, связанная с недостаточной проверкой необычных или исключительных состояний, позволяющая нарушителю повысить привилегии
EPSS
8.8 High
CVSS3