=== chris14_ is now known as chris14 === ChanServ changed the topic of #ubuntu-security to: Twitter: @ubuntu_sec || https://usn.ubuntu.com || https://wiki.ubuntu.com/SecurityTeam || https://wiki.ubuntu.com/Security/Features || Community: sarnold [15:18] hm, https://ubuntu.com/security/CVE-2022-21216 - "may allow a privileged user to potentially enable escalation of privilege via adjacent network access" - what kind of gibberish is this? [15:18] -ubottu:#ubuntu-security- Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. [15:18] do they have to be privileged on my machine to begin with or not? [15:19] if root on a box sitting on the switch next to mine can ... "escalate privs" on my box, that's very different. [15:19] given that it's a firmware update, i wouldn't be surprised, but... === martums010135 is now known as martums01013 === tomreyn_ is now known as tomreyn [19:23] hallyn: my understanding of 'adjacent network access' means privileged access in OOB Management in one system could spill over to adjacent systems running the same firmware/API/etc on its OOB management mechanisms regardless of privileged access on the adjacent machine [19:23] so in theory: VULNERABLEMACHINE privileged user could enable OTHERMACHINE privileged access via adjacent network connection/access [19:23] but that's specifically due to Out Of Band management tools [19:24] (so IPMI, etc. possibly?) [19:24] i wouldn't call that "gibberish" but "complicated, hard to understand terminology use" [19:37] thanks. "network adjacent' could mean different things to people working at different levels, and for something where everyone has to make a decision on priority, i expected to see a bit more detail by the time i'd clicked 5 'for more information' links :) [19:38] (just explaining what i meant by "gibberish" - not asking you for more info - thank you again :) [19:42] this vulnerability in intel hardware/firmware was identified by intel staff - pretty surely you won't see technical details discussed openly. and, like most of the time when vulnerabilities are identified 'internally', at least by some enterprise like intel, you don't even get a clear description. [20:07] what tomreyn said [20:07] so it's up to interpretation basically on what that means [20:08] hallyn: ^ [20:10] :)