Bug 1208276 (CVE-2022-33196) - VUL-0: CVE-2022-33196: microcode_ctl,ucode-intel: INTEL-SA-00738: SGX privilege escalation via incorrect default permissions
Summary: VUL-0: CVE-2022-33196: microcode_ctl,ucode-intel: INTEL-SA-00738: SGX privile...
Status: RESOLVED FIXED
Alias: CVE-2022-33196
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Marcus Meissner
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/357262/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-33196:7.2:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-02-15 08:03 UTC by Marcus Meissner
Modified: 2024-05-17 12:10 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2023-02-15 08:03:26 UTC
CVE-2022-33196

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html

Summary: 

A potential security vulnerability in some Intel® Xeon® Processors with Intel® Software Guard Extensions (SGX) may allow escalation of privilege.  Intel is releasing firmware updates to mitigate this potential vulnerability.
 
Vulnerability Details:

CVEID: CVE-2022-33196

Description: Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access. 

CVSS Base Score:  7.2 High

CVSS Vector:  CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
Comment 1 OBSbugzilla Bot 2023-02-15 09:55:04 UTC
This is an autogenerated message for OBS integration:
This bug (1208276) was mentioned in
https://build.opensuse.org/request/show/1065907 Factory / ucode-intel
Comment 4 Swamp Workflow Management 2023-02-20 17:18:27 UTC
SUSE-SU-2023:0456-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1208275,1208276,1208277
CVE References: CVE-2022-21216,CVE-2022-33196,CVE-2022-38090
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    ucode-intel-20230214-3.49.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2023-02-20 17:20:01 UTC
SUSE-SU-2023:0454-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1208275,1208276,1208277
CVE References: CVE-2022-21216,CVE-2022-33196,CVE-2022-38090
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    ucode-intel-20230214-150100.3.217.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    ucode-intel-20230214-150100.3.217.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    ucode-intel-20230214-150100.3.217.1
SUSE CaaS Platform 4.0 (src):    ucode-intel-20230214-150100.3.217.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2023-02-20 17:23:33 UTC
SUSE-SU-2023:0455-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1208275,1208276,1208277
CVE References: CVE-2022-21216,CVE-2022-33196,CVE-2022-38090
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    ucode-intel-20230214-13.104.1
SUSE OpenStack Cloud 9 (src):    ucode-intel-20230214-13.104.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    ucode-intel-20230214-13.104.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    ucode-intel-20230214-13.104.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    ucode-intel-20230214-13.104.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-02-28 12:30:11 UTC
SUSE-SU-2023:0568-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1208275, 1208276, 1208277
CVE References: CVE-2022-21216, CVE-2022-33196, CVE-2022-38090
Sources used:
openSUSE Leap Micro 5.3 (src): ucode-intel-20230214-150200.21.1
openSUSE Leap 15.4 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Micro 5.3 (src): ucode-intel-20230214-150200.21.1
Basesystem Module 15-SP4 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Real Time 15 SP3 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): ucode-intel-20230214-150200.21.1
SUSE Manager Proxy 4.2 (src): ucode-intel-20230214-150200.21.1
SUSE Manager Retail Branch Server 4.2 (src): ucode-intel-20230214-150200.21.1
SUSE Manager Server 4.2 (src): ucode-intel-20230214-150200.21.1
SUSE Enterprise Storage 7.1 (src): ucode-intel-20230214-150200.21.1
SUSE Enterprise Storage 7 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Micro 5.1 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Micro 5.2 (src): ucode-intel-20230214-150200.21.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): ucode-intel-20230214-150200.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Marcus Meissner 2024-05-17 12:10:24 UTC
done