{"id":"BELL-CVE-2023-22655","modified":"2026-01-26T09:33:10.890396Z","published":"2024-03-15T05:57:46.857160Z","upstream":["CVE-2023-22655"],"references":[{"type":"ADVISORY","url":"https://docs.bell-sw.com/security/cves/CVE-2023-22655"},{"type":"ADVISORY","url":"https://docs.bell-sw.com/security/advisories/BELL-SA-2024-24"}],"affected":[{"package":{"name":"intel-ucode","ecosystem":"Alpaquita:23","purl":"pkg:apk/alpaquita/intel-ucode?arch=source&distro=23"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"20230516a-r0"},{"fixed":"20240312-r0"}]}],"database_specific":{"source":"https://github.com/bell-sw/osv-database/blob/master/BELL-CVE/BELL-CVE-2023-22655.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpaquita:stream","purl":"pkg:apk/alpaquita/intel-ucode?arch=source&distro=stream"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"20230214-r0"},{"fixed":"20240312-r0"}]}],"database_specific":{"source":"https://github.com/bell-sw/osv-database/blob/master/BELL-CVE/BELL-CVE-2023-22655.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"}]}