{"id":"RHEA-2023:4636","summary":"Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update","modified":"2025-11-22T12:43:06Z","published":"2025-04-23T10:01:13Z","upstream":["CVE-2022-21216","CVE-2022-33196"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHEA-2023:4636"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhea-2023_4636.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171227"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21216"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21216"},{"type":"ARTICLE","url":"https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-33196"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171252"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-33196"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33196"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html"}],"affected":[{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-73.16.el7_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2023:4636.json"}},{"package":{"name":"microcode_ctl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/microcode_ctl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-73.16.el7_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2023:4636.json"}},{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-73.16.el7_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2023:4636.json"}},{"package":{"name":"microcode_ctl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/microcode_ctl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-73.16.el7_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2023:4636.json"}},{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-73.16.el7_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2023:4636.json"}},{"package":{"name":"microcode_ctl-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/microcode_ctl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.1-73.16.el7_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHEA-2023:4636.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"}]}