{"id":"RHBA-2022:8351","summary":"Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update","modified":"2026-03-11T07:31:09.430523Z","published":"2025-12-10T10:01:10Z","upstream":["CVE-2022-0005","CVE-2022-21136","CVE-2022-21151","CVE-2022-21166"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2022:8351"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhba-2022_8351.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0005"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086738"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0005"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0005"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00614.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21136"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21136"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21136"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00616.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086730"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21151"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21166"},{"type":"ARTICLE","url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"}],"affected":[{"package":{"name":"microcode_ctl","ecosystem":"Red Hat:enterprise_linux:9::baseos","purl":"pkg:rpm/redhat/microcode_ctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:20220809-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHBA-2022:8351.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}