Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
Specific combinations of processor instructions lead to undesirable behavior such as locking the processor until a hard reset performed.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2023/11/14/8 | mailing list |
http://www.openwall.com/lists/oss-security/2023/11/14/6 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/11/14/4 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/11/14/5 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/11/14/7 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/11/14/9 | mailing list |
https://security.netapp.com/advisory/ntap-20231116-0015/ | third party advisory |
https://www.debian.org/security/2023/dsa-5563 | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html |