Описание
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.20250812.1ubuntu1 |
| esm-infra-legacy/trusty | ignored | see notes |
| esm-infra/bionic | released | 3.20250812.0ubuntu0.18.04.1+esm1 |
| esm-infra/focal | released | 3.20250812.0ubuntu0.20.04.1+esm1 |
| esm-infra/xenial | released | 3.20250812.0ubuntu0.16.04.1+esm1 |
| jammy | released | 3.20250812.0ubuntu0.22.04.1 |
| noble | released | 3.20250812.0ubuntu0.24.04.1 |
| plucky | released | 3.20250812.0ubuntu0.25.04.1 |
| questing | released | 3.20250812.0ubuntu0.25.10.1 |
| upstream | released | 20250812 |
Показывать по
EPSS
7.4 High
CVSS3
Связанные уязвимости
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
Sequence of processor instructions leads to unexpected behavior for so ...
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
Уязвимость микропрограммного обеспечения процессоров Intel Xeon, связанная с некорректной последовательностью инструкций процессора, позволяющая нарушителю повысить свои привилегии
EPSS
7.4 High
CVSS3