Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Intel-microcode | Ubuntu | devel | * | 
| Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * | 
| Intel-microcode | Ubuntu | esm-infra/bionic | * | 
| Intel-microcode | Ubuntu | esm-infra/focal | * | 
| Intel-microcode | Ubuntu | esm-infra/xenial | * | 
| Intel-microcode | Ubuntu | focal | * | 
| Intel-microcode | Ubuntu | jammy | * | 
| Intel-microcode | Ubuntu | noble | * | 
| Intel-microcode | Ubuntu | trusty/esm | * | 
| Intel-microcode | Ubuntu | upstream | * |