Описание
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20240514.1 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20240514.0ubuntu0.18.04.1+esm1 |
esm-infra/focal | not-affected | 3.20240514.0ubuntu0.20.04.1 |
esm-infra/xenial | released | 3.20240514.0ubuntu0.16.04.1+esm1 |
focal | released | 3.20240514.0ubuntu0.20.04.1 |
jammy | released | 3.20240514.0ubuntu0.22.04.1 |
mantic | released | 3.20240514.0ubuntu0.23.10.1 |
noble | released | 3.20240514.0ubuntu0.24.04.1 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support early microcode loading at runtime] |
Показывать по
6 Medium
CVSS3
Связанные уязвимости
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
Improper input validation in some Intel(R) TDX module software before ...
Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость аппаратной доверенной среды выполнения (TEE) для развертывания виртуальных машин Intel Trust Domain Extensions (Intel TDX), связанная с неправильной проверкой входных данных, позволяющая нарушителю повысить свои привилегии
6 Medium
CVSS3