CVE-2019-11139
Published: November 14, 2019Last modified: November 8, 2023
Description
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | HIGH |
User interaction | NONE |
Scope | CHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | intel-ucode | Not affected (20230808-r0) |
Stream | intel-ucode | Not affected (20230808-r0) |
References
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html
- https://seclists.org/bugtraq/2019/Dec/28
- https://support.f5.com/csp/article/K42433061?utm_source=f5support&%3Butm_medium=RSS
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html