Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-33196

Опубликовано: 16 фев. 2023
Источник: redhat
CVSS3: 7.2
EPSS Низкий

Описание

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

A flaw was found in the Linux kernel. Some Intel(R) Xeon(R) processors with Intel® Software Guard Extensions (SGX) may allow privilege escalation. This issue may allow a privileged user to enable privilege escalation via local access.

Отчет

Red Hat has very limited visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content. In most cases, it merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required for releasing this content as RHSA, in terms of Red Hat-owned development processes and QA documentation. For more information, please contact the binary content vendor.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6microcode_ctlOut of support scope
Red Hat Enterprise Linux 7microcode_ctlFixedRHEA-2023:463614.08.2023
Red Hat Enterprise Linux 8microcode_ctlFixedRHEA-2023:711714.11.2023
Red Hat Enterprise Linux 9microcode_ctlFixedRHEA-2023:663707.11.2023
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8redhat-virtualization-hostFixedRHSA-2023:520919.09.2023

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2171252kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations

EPSS

Процентиль: 8%
0.00029
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
почти 3 года назад

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS3: 7.2
nvd
почти 3 года назад

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS3: 7.2
debian
почти 3 года назад

Incorrect default permissions in some memory controller configurations ...

CVSS3: 6.7
github
почти 3 года назад

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS3: 6.7
fstec
почти 3 года назад

Уязвимость микрокода процессоров Intel Microcode, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 8%
0.00029
Низкий

7.2 High

CVSS3