Updated microcode packages fix security vulnerabilities
Publication date: 11 Mar 2023Modification date: 11 Mar 2023
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-21216 , CVE-2022-33196 , CVE-2022-33972 , CVE-2022-38090
Description
Updated microcode packages fix security vulnerabilities: Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access (CVE-2022-21216 / intel-sa-00700). Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access (CVE-2022-33196 / intel-sa-00738). Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access (CVE-2022-33972 / intel-sa-00730). Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access (CVE-2022-38090 / intel-sa-00767).
References
- https://bugs.mageia.org/show_bug.cgi?id=31581
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090
SRPMS
8/nonfree
- microcode-0.20230214-1.mga8.nonfree