Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 9 | RedHat | microcode_ctl-4:20240910-1.el9_5 | * |
Intel-microcode | Ubuntu | bionic | * |
Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * |
Intel-microcode | Ubuntu | esm-infra/bionic | * |
Intel-microcode | Ubuntu | esm-infra/xenial | * |
Intel-microcode | Ubuntu | focal | * |
Intel-microcode | Ubuntu | jammy | * |
Intel-microcode | Ubuntu | mantic | * |
Intel-microcode | Ubuntu | trusty | * |
Intel-microcode | Ubuntu | trusty/esm | * |
Intel-microcode | Ubuntu | xenial | * |