Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3379-1 | intel-microcode security update |
EUVD |
EUVD-2022-36240 | Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access. |
Ubuntu USN |
USN-5886-1 | Intel Microcode vulnerabilities |
Wed, 23 Apr 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:7 |
Mon, 17 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat enterprise Linux
|
|
| CPEs | cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat enterprise Linux
|
Mon, 27 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-01-27T18:14:48.745Z
Reserved: 2022-07-22T03:00:24.391Z
Link: CVE-2022-33196
Updated: 2024-08-03T08:01:20.401Z
Status : Modified
Published: 2023-02-16T21:15:12.427
Modified: 2024-11-21T07:07:41.880
Link: CVE-2022-33196
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN