VYPR

rpm package

suse/ucode-intel&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP2

pkg:rpm/suse/ucode-intel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2

Vulnerabilities (33)

  • CVE-2022-41804Aug 11, 2023
    affected < 20230808-150200.27.1fixed 20230808-150200.27.1

    Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-23908Aug 11, 2023
    affected < 20230808-150200.27.1fixed 20230808-150200.27.1

    Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2022-40982Aug 11, 2023
    affected < 20230808-150200.27.1fixed 20230808-150200.27.1

    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2022-38090Feb 16, 2023
    affected < 20230214-150200.21.1fixed 20230214-150200.21.1

    Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2022-33196Feb 16, 2023
    affected < 20230214-150200.21.1fixed 20230214-150200.21.1

    Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2022-33972Feb 16, 2023
    affected < 20230512-150200.24.1fixed 20230512-150200.24.1

    Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2022-21216Feb 16, 2023
    affected < 20230214-150200.21.1fixed 20230214-150200.21.1

    Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.

  • CVE-2022-21233Aug 18, 2022
    affected < 20220809-150200.18.1fixed 20220809-150200.18.1

    Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2022-21151May 12, 2022
    affected < 20220510-150200.14.1fixed 20220510-150200.14.1

    Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2021-33120Feb 9, 2022
    affected < 20220207-10.1fixed 20220207-10.1

    Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.

  • CVE-2021-0127Feb 9, 2022
    affected < 20220207-10.1fixed 20220207-10.1

    Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.

  • CVE-2021-0145Feb 9, 2022
    affected < 20220207-10.1fixed 20220207-10.1

    Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2021-0146Nov 17, 2021
    affected < 20220207-10.1fixed 20220207-10.1

    Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Page 2 of 2