Bug 2086738 (CVE-2022-0005)
| Summary: | CVE-2022-0005 hw: cpu: information disclosure via Intel Software Guard Extensions (SGX) Platform | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
| Component: | vulnerability | Assignee: | Nobody <nobody> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in hw. Sensitive information accessible by physical probing of the JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to disclose information via physical access.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2086739, 2086740, 2086741, 2086742, 2086743, 2086744, 2086745, 2086746, 2086747, 2086748, 2086749, 2086750, 2086751 | ||
| Bug Blocks: | 2086725 | ||
|
Description
Petr Matousek
2022-05-16 14:23:06 UTC
|