Описание
Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20240813.2 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20240813.0ubuntu0.18.04.1+esm2 |
esm-infra/focal | not-affected | 3.20240813.0ubuntu0.20.04.2 |
esm-infra/xenial | released | 3.20240813.0ubuntu0.16.04.1+esm2 |
focal | released | 3.20240813.0ubuntu0.20.04.2 |
jammy | released | 3.20240813.0ubuntu0.22.04.2 |
noble | released | 3.20240813.0ubuntu0.24.04.2 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support early microcode loading at runtime] |
upstream | released | 3.20240813.2 |
Показывать по
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Protection mechanism failure in some 3rd, 4th, and 5th Generation Inte ...
Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость процессоров Intel Xeon, связанная c нарушением механизма защиты данных, позволяющая нарушителю повысить свои привилегии
EPSS
6.1 Medium
CVSS3