Back to bug 2171252
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2023-02-19 12:03:28 UTC | Depends On | 2171253 | |
| Alex | 2023-02-19 12:14:05 UTC | Depends On | 2171264, 2171256, 2171258, 2171260, 2171263, 2171262, 2171257, 2171259, 2171261, 2171255, 2171254 | |
| RaTasha Tillery-Smith | 2023-02-20 15:40:14 UTC | Doc Text | A potential security vulnerability in some Intel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX) may allow escalation of privilege. This may allow a privileged user to potentially enable escalation of privilege via local access. | A flaw was found in the Linux kernel. A potential security vulnerability in some Intel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX) may allow escalation of privilege. This flaw may allow a privileged user to enable privilege escalation via local access. |
| Justin M. Forbes | 2023-03-01 19:45:50 UTC | Doc Type | --- | If docs needed, set a value |
| CC | jforbes | |||
| Paige Jung | 2023-03-01 20:03:09 UTC | Doc Text | A flaw was found in the Linux kernel. A potential security vulnerability in some Intel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX) may allow escalation of privilege. This flaw may allow a privileged user to enable privilege escalation via local access. | A flaw was found in the Linux kernel. Some Intel(R) Xeon(R) processors with Intel® Software Guard Extensions (SGX) may allow privilege escalation. This issue may allow a privileged user to enable privilege escalation via local access. |
| Red Hat Bugzilla | 2023-05-01 08:29:23 UTC | CC | skozina | |
| Red Hat Bugzilla | 2023-07-07 08:29:43 UTC | Assignee | security-response-team | nobody |
Back to bug 2171252