Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
During installation, installed file permissions are set to allow anyone to modify those files.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Intel-microcode | Ubuntu | devel | * | 
| Intel-microcode | Ubuntu | esm-infra-legacy/trusty | * | 
| Intel-microcode | Ubuntu | esm-infra/bionic | * | 
| Intel-microcode | Ubuntu | esm-infra/focal | * | 
| Intel-microcode | Ubuntu | esm-infra/xenial | * | 
| Intel-microcode | Ubuntu | focal | * | 
| Intel-microcode | Ubuntu | jammy | * | 
| Intel-microcode | Ubuntu | noble | * | 
| Intel-microcode | Ubuntu | oracular | * | 
| Intel-microcode | Ubuntu | trusty/esm | * | 
| Intel-microcode | Ubuntu | upstream | * |