Описание
Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.20250812.1ubuntu1 |
| esm-infra-legacy/trusty | ignored | see notes |
| esm-infra/bionic | released | 3.20250812.0ubuntu0.18.04.1+esm1 |
| esm-infra/focal | released | 3.20250812.0ubuntu0.20.04.1+esm1 |
| esm-infra/xenial | released | 3.20250812.0ubuntu0.16.04.1+esm1 |
| jammy | released | 3.20250812.0ubuntu0.22.04.1 |
| noble | released | 3.20250812.0ubuntu0.24.04.1 |
| plucky | released | 3.20250812.0ubuntu0.25.04.1 |
| questing | released | 3.20250812.0ubuntu0.25.10.1 |
| upstream | released | 20250812 |
Показывать по
EPSS
7.2 High
CVSS3
Связанные уязвимости
Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
Insufficient control flow management in the Alias Checking Trusted Mod ...
Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость микропрограммного обеспечения процессоров Intel серии Xeon, связанная с реализацией некорректного потока управления, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
EPSS
7.2 High
CVSS3