Latest intel sgx sdk Vulnerabilities

Insufficient control flow management for the Intel(R) SGX SDK software for Linux before version 2.16.100.1 may allow an authenticated user to potentially enable information disclosure via local access...
Intel Sgx Sdk<2.16.100.1
Linux Linux kernel
Intel Sgx Sdk<2.15.100.1
Microsoft Windows
Improper conditions check in the Intel(R) SGX SDK software may allow a privileged user to potentially enable information disclosure via local access.
Intel Sgx Sdk<2.16.100.1
Linux Linux kernel
Intel Sgx Sdk<2.15.100.1
Microsoft Windows
Premature release of resource during expected lifetime in the Intel(R) SGX SDK software may allow a privileged user to potentially enable information disclosure via local access.
Intel Sgx Sdk<2.17.100.1
Intel Sgx Sdk<2.18.100.1
Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
ubuntu/intel-microcode<3.20220510.1
ubuntu/intel-microcode<3.20220510.0ubuntu0.18.04.1
ubuntu/intel-microcode<3.20220510.0ubuntu0.20.04.1
ubuntu/intel-microcode<3.20220510.0ubuntu0.21.10.1
ubuntu/intel-microcode<3.20220510.0ubuntu0.22.04.1
ubuntu/intel-microcode<3.20220510.0ubuntu1
and 19 more
Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:3.10.0-1160.76.1.rt56.1220.el7
redhat/kernel<0:3.10.0-1160.76.1.el7
redhat/kernel-rt<0:4.18.0-372.26.1.rt7.183.el8_6
redhat/kernel<0:4.18.0-372.26.1.el8_6
redhat/kernel<0:4.18.0-147.76.1.el8_1
redhat/kernel<0:4.18.0-193.93.1.el8_2
and 174 more
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:3.10.0-1160.76.1.rt56.1220.el7
redhat/kernel<0:3.10.0-1160.76.1.el7
redhat/kernel-rt<0:4.18.0-372.26.1.rt7.183.el8_6
redhat/kernel<0:4.18.0-372.26.1.el8_6
redhat/kernel<0:4.18.0-147.76.1.el8_1
redhat/kernel<0:4.18.0-193.93.1.el8_2
and 174 more
Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:3.10.0-1160.76.1.rt56.1220.el7
redhat/kernel<0:3.10.0-1160.76.1.el7
redhat/kernel-rt<0:4.18.0-372.26.1.rt7.183.el8_6
redhat/kernel<0:4.18.0-372.26.1.el8_6
redhat/kernel<0:4.18.0-147.76.1.el8_1
redhat/kernel<0:4.18.0-193.93.1.el8_2
and 174 more
Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via local access.
Intel Sgx Sdk<=2.12
Intel Sgx Sdk<=2.13
Intel Xeon Gold 6342 Firmware
Intel Xeon Gold 6342
Intel Xeon Gold 6346 Firmware
Intel Xeon Gold 6346
and 360 more
Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access.
Intel Integrated Performance Primitives Cryptography=2019
Intel Integrated Performance Primitives Cryptography=2019-update_1
Intel Integrated Performance Primitives Cryptography=2019-update_2
Intel Integrated Performance Primitives Cryptography=2019-update_3
Intel Integrated Performance Primitives Cryptography=2019-update_4
Intel Integrated Performance Primitives Cryptography=2020
and 6 more
Improper file verification in install routine for Intel(R) SGX SDK and Platform Software for Windows before 2.2.100 may allow an escalation of privilege via local access.
Intel Sgx Platform Software<2.2.100
Microsoft Windows
Intel Sgx Sdk<2.2.100

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203