{
  "threat_severity" : "Moderate",
  "public_date" : "2022-05-10T00:00:00Z",
  "bugzilla" : {
    "description" : "hw: cpu: information disclosure via Intel Software Guard Extensions (SGX) Platform",
    "id" : "2086738",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2086738"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.9",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-276",
  "details" : [ "Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access.", "A flaw was found in hw. Sensitive information accessible by physical probing of the JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to disclose information via physical access." ],
  "statement" : "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
  "acknowledgement" : "Red Hat would like to thank Intel for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-11-15T00:00:00Z",
    "advisory" : "RHBA-2022:8351",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "microcode_ctl-4:20220809-1.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Affected",
    "package_name" : "microcode_ctl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "microcode_ctl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "microcode_ctl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-0005\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-0005\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00614.html" ],
  "name" : "CVE-2022-0005",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}