Описание
Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20240813.2 |
esm-infra-legacy/trusty | ignored | trusty doesn't support early microcode loading at runtime |
esm-infra/bionic | released | 3.20240813.0ubuntu0.18.04.1+esm2 |
esm-infra/focal | not-affected | 3.20240813.0ubuntu0.20.04.2 |
esm-infra/xenial | released | 3.20240813.0ubuntu0.16.04.1+esm2 |
focal | released | 3.20240813.0ubuntu0.20.04.2 |
jammy | released | 3.20240813.0ubuntu0.22.04.2 |
noble | released | 3.20240813.0ubuntu0.24.04.2 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support early microcode loading at runtime] |
upstream | released | 3.20240813.2 |
Показывать по
EPSS
7.2 High
CVSS3
Связанные уязвимости
Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
Incorrect behavior order in transition between executive monitor and S ...
Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость гипервизора SMI transfer monitor (STM) микропрограммного обеспечения процессоров Intel, позволяющая нарушителю повысить свои привилегии
EPSS
7.2 High
CVSS3