{"id":"ALPINE-CVE-2022-33196","details":"Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.","modified":"2025-12-03T22:49:05.624617Z","published":"2023-02-16T21:15:12.427Z","upstream":["CVE-2022-33196"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2022-33196"}],"affected":[{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220510-r0","20220809-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220510-r0","20220809-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0","20221108-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0","20221108-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0","20221108-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0","20221108-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0","20221108-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20230214-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2","20190514a-r0","20190618-r0","20190918-r0","20191112-r0","20191113-r0","20191115-r0","20200508-r0","20200520-r0","20200609-r0","20200616-r0","20201110-r0","20201112-r0","20210216-r0","20210608-r0","20220207-r0","20220419-r0","20220510-r0","20220809-r0","20221108-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-33196.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}