Bug 2171227 (CVE-2022-21216) - CVE-2022-21216 kernel: Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors
Summary: CVE-2022-21216 kernel: Intel firmware update for insufficient granularity of ...
Keywords:
Status: MODIFIED
Alias: CVE-2022-21216
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2171228 2171229 2171230 2171231 2171232 2171233 2171234 2171235 2171236 2171237 2171238 2171239
Blocks: 2169989
TreeView+ depends on / blocked
 
Reported: 2023-02-19 10:43 UTC by Alex
Modified: 2024-02-07 13:16 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel. A potential security vulnerability in some Intel(R) Atom(R) and Intel(R) Xeon(R) Scalable Processors may allow privilege escalation. This flaw may allow a privileged user to enable privilege escalation via adjacent network access.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:5209 0 None None None 2023-09-19 01:08:47 UTC

Description Alex 2023-02-19 10:43:34 UTC
A potential security vulnerability in some Intel(R) Atom(R) and Intel(R) Xeon(R) Scalable Processors may allow escalation of privilege.  Intel is releasing firmware updates to mitigate this potential vulnerability.

Reference:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html

Comment 1 Alex 2023-02-19 10:56:06 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2171228]

Comment 5 errata-xmlrpc 2023-09-19 01:08:44 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 8

Via RHSA-2023:5209 https://access.redhat.com/errata/RHSA-2023:5209


Note You need to log in before you can comment on or make changes to this bug.