Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-24980

Опубликовано: 14 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.1

Описание

Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

РелизСтатусПримечание
devel

released

3.20240813.2
esm-infra-legacy/trusty

ignored

trusty doesn't support early microcode loading at runtime
esm-infra/bionic

released

3.20240813.0ubuntu0.18.04.1+esm2
esm-infra/focal

not-affected

3.20240813.0ubuntu0.20.04.2
esm-infra/xenial

released

3.20240813.0ubuntu0.16.04.1+esm2
focal

released

3.20240813.0ubuntu0.20.04.2
jammy

released

3.20240813.0ubuntu0.22.04.2
noble

released

3.20240813.0ubuntu0.24.04.2
trusty/esm

ignored

end of ESM support, was ignored [trusty doesn't support early microcode loading at runtime]
upstream

released

3.20240813.2

Показывать по

EPSS

Процентиль: 9%
0.00035
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
10 месяцев назад

Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS3: 6.1
debian
10 месяцев назад

Protection mechanism failure in some 3rd, 4th, and 5th Generation Inte ...

CVSS3: 6.1
github
10 месяцев назад

Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость процессоров Intel Xeon, связанная c нарушением механизма защиты данных, позволяющая нарушителю повысить свои привилегии

suse-cvrf
10 месяцев назад

Security update for ucode-intel

EPSS

Процентиль: 9%
0.00035
Низкий

6.1 Medium

CVSS3