Erik C. Bjorge discovered that some Intel(R) Atom and Intel Xeon Scalable
Processors did not properly implement access controls for out-of-band
management. This may allow a privileged network-adjacent user to potentially
escalate privileges. (CVE-2022-21216)
Cfir Cohen, Erdem Aktas, Felix Wilhelm, James Forshaw, Josh Eads, Nagaraju
Kodalapura Nagabhushana Rao, Przemyslaw Duda, Liron Shacham and Ron Anderson
discovered that some Intel(R) Xeon(R) Processors used incorrect default
permissions in some memory controller configurations when using Intel(R)
Software Guard Extensions. This may allow a privileged local user to potentially
escalate privileges. (CVE-2022-33196)
It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable Processors
did not properly calculate microkey keying. This may allow a privileged local
user to potentially disclose information. (CVE-2022-33972)
Joseph Nuzman discovered that some Intel(R) Processors when using Intel(R)
Software Guard Extensions did not properly isolate shared resources. This may
allow a privileged local user to potentially disclose
information. (CVE-2022-38090)
More Stories
SEC Consult SA-20240930-0 :: Local Privilege Escalation via MSI Installer in Nitro PDF Pro (CVE-2024-35288)
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 30 <<< application/pkcs7-signature; name="smime.p7s": Unrecognized >>> Read More
USN-7046-1: Flatpak and Bubblewrap vulnerability
It was discovered that Flatpak incorrectly handled certain persisted directories. An attacker could possibly use this issue to read and...
crosswords-0.3.13.3-4.fc41
FEDORA-2024-851219f5e3 Packages in this update: crosswords-0.3.13.3-4.fc41 Update description: Update to 0.3.13.3 and fix gresource generation Read More
perl-App-cpanminus-1.7047-2.fc39
FEDORA-2024-78e43b4de6 Packages in this update: perl-App-cpanminus-1.7047-2.fc39 Update description: Patch the code to use https instead of http (CVE-2024-45321) Read More
perl-App-cpanminus-1.7047-4.fc40
FEDORA-2024-aaa468ae4f Packages in this update: perl-App-cpanminus-1.7047-4.fc40 Update description: Patch the code to use https instead of http (CVE-2024-45321) Read More
perl-App-cpanminus-1.7047-5.fc41
FEDORA-2024-ef9db8b16d Packages in this update: perl-App-cpanminus-1.7047-5.fc41 Update description: Patch the code to use https instead of http (CVE-2024-45321) Read More