{"id":"USN-5886-1","summary":"intel-microcode vulnerabilities","details":"Erik C. Bjorge discovered that some Intel(R) Atom and Intel Xeon Scalable\nProcessors did not properly implement access controls for out-of-band\nmanagement. This may allow a privileged network-adjacent user to potentially\nescalate privileges. (CVE-2022-21216)\n\nCfir Cohen, Erdem Aktas, Felix Wilhelm, James Forshaw, Josh Eads, Nagaraju\nKodalapura Nagabhushana Rao, Przemyslaw Duda, Liron Shacham and Ron Anderson\ndiscovered that some Intel(R) Xeon(R) Processors used incorrect default\npermissions in some memory controller configurations when using Intel(R)\nSoftware Guard Extensions. This may allow a privileged local user to potentially\nescalate privileges. (CVE-2022-33196)\n\nIt was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable Processors\ndid not properly calculate microkey keying. This may allow a privileged local\nuser to potentially disclose information.  (CVE-2022-33972)\n\nJoseph Nuzman discovered that some Intel(R) Processors when using Intel(R)\nSoftware Guard Extensions did not properly isolate shared resources. This may\nallow a privileged local user to potentially disclose\ninformation. (CVE-2022-38090)\n","modified":"2026-02-10T04:42:58Z","published":"2023-02-27T05:12:38Z","related":["UBUNTU-CVE-2022-21216","UBUNTU-CVE-2022-33196","UBUNTU-CVE-2022-33972","UBUNTU-CVE-2022-38090"],"upstream":["CVE-2022-21216","CVE-2022-33196","CVE-2022-33972","CVE-2022-38090","UBUNTU-CVE-2022-21216","UBUNTU-CVE-2022-33196","UBUNTU-CVE-2022-33972","UBUNTU-CVE-2022-38090"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5886-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21216"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33196"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33972"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-38090"}],"affected":[{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20230214.0ubuntu0.16.04.1+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20230214.0ubuntu0.16.04.1+esm1"}]}],"versions":["3.20150121.1","3.20151106.1","3.20170707.1~ubuntu16.04.0","3.20180108.0~ubuntu16.04.2","3.20180108.0+really20170707ubuntu16.04.1","3.20180312.0~ubuntu16.04.1","3.20180425.1~ubuntu0.16.04.1","3.20180425.1~ubuntu0.16.04.2","3.20180807a.0ubuntu0.16.04.1","3.20190514.0ubuntu0.16.04.1","3.20190514.0ubuntu0.16.04.2","3.20190618.0ubuntu0.16.04.1","3.20191112-0ubuntu0.16.04.2","3.20191115.1ubuntu0.16.04.1","3.20191115.1ubuntu0.16.04.2","3.20200609.0ubuntu0.16.04.0","3.20200609.0ubuntu0.16.04.1","3.20201110.0ubuntu0.16.04.1","3.20201110.0ubuntu0.16.04.2","3.20210216.0ubuntu0.16.04.1","3.20210608.0ubuntu0.16.04.1+esm1","3.20220510.0ubuntu0.16.04.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"intel-microcode","binary_version":"3.20230214.0ubuntu0.16.04.1+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5886-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21216"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33196"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-38090"}]}}},{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20230214.0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20230214.0ubuntu0.18.04.1"}]}],"versions":["3.20170707.1","3.20171117.1","3.20180108.1","3.20180108.1+really20171117.1","3.20180312.0~ubuntu18.04.1","3.20180425.1~ubuntu0.18.04.1","3.20180425.1~ubuntu0.18.04.2","3.20180807a.0ubuntu0.18.04.1","3.20190514.0ubuntu0.18.04.2","3.20190514.0ubuntu0.18.04.3","3.20190618.0ubuntu0.18.04.1","3.20191112-0ubuntu0.18.04.2","3.20191115.1ubuntu0.18.04.1","3.20191115.1ubuntu0.18.04.2","3.20200609.0ubuntu0.18.04.0","3.20200609.0ubuntu0.18.04.1","3.20201110.0ubuntu0.18.04.1","3.20201110.0ubuntu0.18.04.2","3.20210216.0ubuntu0.18.04.1","3.20210608.0ubuntu0.18.04.1","3.20220510.0ubuntu0.18.04.1","3.20220809.0ubuntu0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"intel-microcode","binary_version":"3.20230214.0ubuntu0.18.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5886-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21216"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33196"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-38090"}]}}},{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20230214.0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20230214.0ubuntu0.20.04.1"}]}],"versions":["3.20190918.1ubuntu1","3.20191115.1ubuntu1","3.20191115.1ubuntu2","3.20191115.1ubuntu3","3.20200609.0ubuntu0.20.04.0","3.20200609.0ubuntu0.20.04.1","3.20200609.0ubuntu0.20.04.2","3.20201110.0ubuntu0.20.04.1","3.20201110.0ubuntu0.20.04.2","3.20210216.0ubuntu0.20.04.1","3.20210608.0ubuntu0.20.04.1","3.20220510.0ubuntu0.20.04.1","3.20220809.0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"intel-microcode","binary_version":"3.20230214.0ubuntu0.20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5886-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21216"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33196"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-38090"}]}}},{"package":{"name":"intel-microcode","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/intel-microcode@3.20230214.0ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.20230214.0ubuntu0.22.04.1"}]}],"versions":["3.20210608.2ubuntu1","3.20220510.0ubuntu0.22.04.1","3.20220809.0ubuntu0.22.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"intel-microcode","binary_version":"3.20230214.0ubuntu0.22.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5886-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21216"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33196"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-38090"}]}}}],"schema_version":"1.7.3"}