Описание
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 0~20180205.c0d9813c-2ubuntu0.2 |
| devel | not-affected | 2020.05-1 |
| eoan | released | 0~20190606.20d2e5a1-2ubuntu1.1 |
| esm-apps/bionic | released | 0~20180205.c0d9813c-2ubuntu0.2 |
| esm-apps/xenial | released | 0~20160408.ffea0a2c-2ubuntu0.1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | not-affected | 0~20191122.bd85bf54-2ubuntu3 |
| focal | not-affected | 0~20191122.bd85bf54-2ubuntu3 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Integer truncation in EDK II may allow an authenticated user to potent ...
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
ELSA-2020-1712: edk2 security, bug fix, and enhancement update (MODERATE)
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3