Описание
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 3.20230214.0ubuntu0.18.04.1 |
| devel | released | 3.20230214.0ubuntu1 |
| esm-infra-legacy/trusty | ignored | trusty doesn't support runtime microcode loading |
| esm-infra/bionic | released | 3.20230214.0ubuntu0.18.04.1 |
| esm-infra/focal | released | 3.20230214.0ubuntu0.20.04.1 |
| esm-infra/xenial | released | 3.20230214.0ubuntu0.16.04.1+esm1 |
| focal | released | 3.20230214.0ubuntu0.20.04.1 |
| jammy | released | 3.20230214.0ubuntu0.22.04.1 |
| kinetic | released | 3.20230214.0ubuntu0.22.10.1 |
| trusty | ignored | end of standard support |
Показывать по
7.2 High
CVSS3
Связанные уязвимости
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Incorrect default permissions in some memory controller configurations ...
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость микрокода процессоров Intel Microcode, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
7.2 High
CVSS3