Описание
Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20240813.2 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20240813.0ubuntu0.18.04.1+esm2 |
esm-infra/focal | not-affected | 3.20240813.0ubuntu0.20.04.2 |
esm-infra/xenial | released | 3.20240813.0ubuntu0.16.04.1+esm2 |
focal | released | 3.20240813.0ubuntu0.20.04.2 |
jammy | released | 3.20240813.0ubuntu0.22.04.2 |
noble | released | 3.20240813.0ubuntu0.24.04.2 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support early microcode loading at runtime] |
upstream | released | 3.20240813.2 |
Показывать по
EPSS
6 Medium
CVSS3
Связанные уязвимости
Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Mirrored regions with different values in 3rd Generation Intel(R) Xeon ...
Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Уязвимость микропрограммного обеспечения процессоров 3rd Generation Intel Xeon Scalable Processor, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6 Medium
CVSS3