CVE Vulnerabilities

CVE-2023-49141

Improper Isolation of Shared Resources on System-on-a-Chip (SoC)

Published: Aug 14, 2024 | Modified: Aug 14, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.

Weakness

The System-On-a-Chip (SoC) does not properly isolate shared resources between trusted and untrusted agents.

Affected Software

Name Vendor Start Version End Version
Intel-microcode Ubuntu devel *
Intel-microcode Ubuntu esm-infra-legacy/trusty *
Intel-microcode Ubuntu esm-infra/bionic *
Intel-microcode Ubuntu esm-infra/xenial *
Intel-microcode Ubuntu focal *
Intel-microcode Ubuntu jammy *
Intel-microcode Ubuntu noble *
Intel-microcode Ubuntu trusty/esm *
Intel-microcode Ubuntu upstream *

Extended Description

A System-On-a-Chip (SoC) has a lot of functionality, but it may have a limited number of pins or pads. A pin can only perform one function at a time. However, it can be configured to perform multiple different functions. This technique is called pin multiplexing. Similarly, several resources on the chip may be shared to multiplex and support different features or functions. When such resources are shared between trusted and untrusted agents, untrusted agents may be able to access the assets intended to be accessed only by the trusted agents.

Potential Mitigations

  • When sharing resources, avoid mixing agents of varying trust levels.
  • Untrusted agents should not share resources with trusted agents.

References