MGASA-2023-0085 - Updated microcode packages fix security vulnerabilities

Publication date: 11 Mar 2023
URL: https://advisories.mageia.org/MGASA-2023-0085.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-21216,
     CVE-2022-33196,
     CVE-2022-33972,
     CVE-2022-38090

Updated microcode packages fix security vulnerabilities:

Insufficient granularity of access control in out-of-band management
in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a
privileged user to potentially enable escalation of privilege via
adjacent network access (CVE-2022-21216 / intel-sa-00700).

Incorrect default permissions in some memory controller configurations
for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard
Extensions which may allow a privileged user to potentially enable
escalation of privilege via local access (CVE-2022-33196 / intel-sa-00738).

Incorrect calculation in microcode keying mechanism for some 3rd
Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged
user to potentially enable information disclosure via local access
(CVE-2022-33972 / intel-sa-00730).

Improper isolation of shared resources in some Intel(R) Processors when
using Intel(R) Software Guard Extensions may allow a privileged user to
potentially enable information disclosure via local access
(CVE-2022-38090 / intel-sa-00767).

References:
- https://bugs.mageia.org/show_bug.cgi?id=31581
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090

SRPMS:
- 8/nonfree/microcode-0.20230214-1.mga8.nonfree

Mageia 2023-0085: microcode security update

Updated microcode packages fix security vulnerabilities: Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Process...

Summary

Updated microcode packages fix security vulnerabilities:
Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access (CVE-2022-21216 / intel-sa-00700).
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access (CVE-2022-33196 / intel-sa-00738).
Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access (CVE-2022-33972 / intel-sa-00730).
Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access (CVE-2022-38090 / intel-sa-00767).

References

- https://bugs.mageia.org/show_bug.cgi?id=31581

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html

- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090

Resolution

MGASA-2023-0085 - Updated microcode packages fix security vulnerabilities

SRPMS

- 8/nonfree/microcode-0.20230214-1.mga8.nonfree

Severity
Publication date: 11 Mar 2023
URL: https://advisories.mageia.org/MGASA-2023-0085.html
Type: security
CVE: CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090

Related News