Описание
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.20240820.1 |
esm-infra-legacy/trusty | ignored | processor not supported during LTS |
esm-infra/bionic | released | 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm3 |
esm-infra/focal | not-affected | 3.20191218.1ubuntu1.3 |
esm-infra/xenial | released | 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm3 |
focal | released | 3.20191218.1ubuntu1.3 |
jammy | released | 3.20191218.1ubuntu2.3 |
noble | released | 3.20231019.1ubuntu2.1 |
oracular | released | 3.20240116.2+nmu1ubuntu1.1 |
trusty/esm | ignored | end of ESM support, was ignored [processor not supported during LTS] |
Показывать по
Ссылки на источники
7.5 High
CVSS3
Связанные уязвимости
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Improper validation in a model specific register (MSR) could allow a m ...
7.5 High
CVSS3