Bug 2021412 (CVE-2021-0146)

Summary: CVE-2021-0146 hw: INTEL-SA-00528
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: arachman, esyr, lveyde, michal.skrivanek, mperina, nobody, sbonazzo, security-response-team, skozina
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
Hardware allows activation of test and debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-12-13 12:06:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2021413, 2021414, 2021415, 2021416, 2021417, 2021418, 2021419, 2021420, 2021421, 2021422, 2021423, 2021424, 2021780, 2021781    
Bug Blocks: 2021411    

Description Petr Matousek 2021-11-09 07:54:51 UTC
Hardware allows activation of test and debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Reference:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html