Lucene search

K
ubuntuUbuntuUSN-5886-1
HistoryFeb 27, 2023 - 12:00 a.m.

Intel Microcode vulnerabilities

2023-02-2700:00:00
ubuntu.com
64
intel microcode
ubuntu
vulnerabilities
privilege escalation
information disclosure
cve-2022-21216
cve-2022-33196
cve-2022-33972
cve-2022-38090

7.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L

5.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Releases

  • Ubuntu 22.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

  • intel-microcode - Processor microcode for Intel CPUs

Details

Erik C. Bjorge discovered that some Intel® Atom and Intel Xeon Scalable
Processors did not properly implement access controls for out-of-band
management. This may allow a privileged network-adjacent user to potentially
escalate privileges. (CVE-2022-21216)

Cfir Cohen, Erdem Aktas, Felix Wilhelm, James Forshaw, Josh Eads, Nagaraju
Kodalapura Nagabhushana Rao, Przemyslaw Duda, Liron Shacham and Ron Anderson
discovered that some Intel® Xeon® Processors used incorrect default
permissions in some memory controller configurations when using Intel®
Software Guard Extensions. This may allow a privileged local user to potentially
escalate privileges. (CVE-2022-33196)

It was discovered that some 3rd Generation Intel® Xeon® Scalable Processors
did not properly calculate microkey keying. This may allow a privileged local
user to potentially disclose information. (CVE-2022-33972)

Joseph Nuzman discovered that some Intel® Processors when using Intel®
Software Guard Extensions did not properly isolate shared resources. This may
allow a privileged local user to potentially disclose
information. (CVE-2022-38090)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.10noarchintel-microcode< 3.20230214.0ubuntu0.22.10.1UNKNOWN
Ubuntu22.04noarchintel-microcode< 3.20230214.0ubuntu0.22.04.1UNKNOWN
Ubuntu20.04noarchintel-microcode< 3.20230214.0ubuntu0.20.04.1UNKNOWN
Ubuntu18.04noarchintel-microcode< 3.20230214.0ubuntu0.18.04.1UNKNOWN
Ubuntu16.04noarchintel-microcode< 3.20230214.0ubuntu0.16.04.1+esm1UNKNOWN
Ubuntu16.04noarchintel-microcode< 3.20210216.0ubuntu0.16.04.1UNKNOWN

7.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L

5.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%