Описание
Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) may allow a privileged user to potentially enable escalation of privilege via local access.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | microcode_ctl | Fix deferred | ||
| Red Hat Enterprise Linux 6 | microcode_ctl | Fix deferred | ||
| Red Hat Enterprise Linux 7 | microcode_ctl | Fix deferred | ||
| Red Hat Enterprise Linux 8 | microcode_ctl | Fix deferred | ||
| Red Hat Enterprise Linux 9 | microcode_ctl | Fix deferred |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) may allow a privileged user to potentially enable escalation of privilege via local access.
Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость технологий Software Guard eXtensions (SGX) и Trust Domain Extensions (TDX) микропрограммного обеспечения процессоров Intel Xeon 6 processor with E-cores, позволяющая нарушителю повысить свои привилегии
EPSS
6.1 Medium
CVSS3