Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xeon_gold_5315y_firmware | Intel | - (including) | - (including) |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | RedHat | redhat-virtualization-host-0:4.5.3-202309130206_8.6 | * |
Intel-microcode | Ubuntu | bionic | * |
Intel-microcode | Ubuntu | devel | * |
Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * |
Intel-microcode | Ubuntu | esm-infra/xenial | * |
Intel-microcode | Ubuntu | focal | * |
Intel-microcode | Ubuntu | jammy | * |
Intel-microcode | Ubuntu | kinetic | * |
Intel-microcode | Ubuntu | trusty | * |
Intel-microcode | Ubuntu | trusty/esm | * |
Intel-microcode | Ubuntu | xenial | * |