Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
The System-On-a-Chip (SoC) does not properly isolate shared resources between trusted and untrusted agents.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Intel-microcode | Ubuntu | devel | * |
Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * |
Intel-microcode | Ubuntu | esm-infra/bionic | * |
Intel-microcode | Ubuntu | esm-infra/xenial | * |
Intel-microcode | Ubuntu | focal | * |
Intel-microcode | Ubuntu | jammy | * |
Intel-microcode | Ubuntu | noble | * |
Intel-microcode | Ubuntu | trusty/esm | * |
Intel-microcode | Ubuntu | upstream | * |
A System-On-a-Chip (SoC) has a lot of functionality, but it may have a limited number of pins or pads. A pin can only perform one function at a time. However, it can be configured to perform multiple different functions. This technique is called pin multiplexing. Similarly, several resources on the chip may be shared to multiplex and support different features or functions. When such resources are shared between trusted and untrusted agents, untrusted agents may be able to access the assets intended to be accessed only by the trusted agents.