Описание
Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.20241112.1ubuntu2 |
esm-infra-legacy/trusty | ignored | trusty doesn't support late loading of microcode |
esm-infra/bionic | released | 3.20241112.0ubuntu0.18.04.1+esm1 |
esm-infra/focal | not-affected | 3.20241112.0ubuntu0.20.04.1 |
esm-infra/xenial | released | 3.20241112.0ubuntu0.16.04.1+esm1 |
focal | released | 3.20241112.0ubuntu0.20.04.1 |
jammy | released | 3.20241112.0ubuntu0.22.04.1 |
noble | released | 3.20241112.0ubuntu0.24.04.1 |
oracular | released | 3.20241112.0ubuntu0.24.10.1 |
trusty/esm | ignored | end of ESM support, was ignored [trusty doesn't support late loading of microcode] |
Показывать по
EPSS
7.2 High
CVSS3
Связанные уязвимости
Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Incorrect default permissions in some Intel(R) Xeon(R) processor memor ...
Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
Уязвимость процессоров Intel Xeon, связанная с некорректно используемыми стандартными разрешениями, позволяющая нарушителю повысить привилегии в системе
EPSS
7.2 High
CVSS3