Описание
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
cosmic | ignored | end of life |
devel | not-affected | 0~20190606.20d2e5a1-2ubuntu1 |
disco | ignored | end of life |
eoan | not-affected | 0~20190606.20d2e5a1-2ubuntu1 |
esm-apps/bionic | released | 0~20180205.c0d9813c-2ubuntu0.3+esm1 |
esm-apps/xenial | released | 0~20160408.ffea0a2c-2ubuntu0.2+esm1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
esm-infra/focal | not-affected | 0~20190606.20d2e5a1-2ubuntu1 |
focal | not-affected | 0~20190606.20d2e5a1-2ubuntu1 |
Показывать по
EPSS
4.6 Medium
CVSS2
6.7 Medium
CVSS3
Связанные уязвимости
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
Insufficient memory write check in SMM service for EDK II may allow an ...
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
EPSS
4.6 Medium
CVSS2
6.7 Medium
CVSS3