{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Update Intel CPU microcode to microcode-20231114 release, addresses\n  CVE-2022-40982 (INTEL-SA-00828), CVE-2022-41804 (INTEL-SA-00837),\n  CVE-2023-23908 (INTEL-SA-00836), CVE-2023-23583 (INTEL-SA-00950):\n  - Addition of 06-9a-04/0x40 microcode (in 06-9a-04) at revision 0x5;\n  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-02) at revision 0x411c;\n  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-02) at revision 0x411c;\n  - Addition of 06-ba-03/0xe0 microcode (in 06-ba-02) at revision 0x411c;\n  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-03) at revision 0x411c;\n  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-03) at revision 0x411c;\n  - Addition of 06-ba-03/0xe0 microcode (in 06-ba-03) at revision 0x411c;\n  - Addition of 06-be-00/0x11 microcode (in 06-be-00) at revision 0x12;\n  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-02) at revision 0x410e;\n  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-02) at revision 0x410e;\n  - Removal of 06-ba-03/0xc0 microcode (in 06-ba-02) at revision 0x410e;\n  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-03) at revision 0x410e;\n  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-03) at revision 0x410e;\n  - Removal of 06-ba-03/0xc0 microcode (in 06-ba-03) at revision 0x410e;\n  - Update of 06-55-03/0x97 (SKX-SP B1) microcode (in 06-55-03) from revision\n    0x1000161 up to 0x1000181;\n  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in 06-55-04)\n    from revision 0x2006e05 up to 0x2007006;\n  - Update of 06-55-06/0xbf (CLX-SP B0) microcode (in 06-55-06) from revision\n    0x4003303 up to 0x4003604;\n  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode (in 06-55-07) from\n    revision 0x5003303 up to 0x5003604;\n  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode (in 06-55-0b) from revision\n    0x7002503 up to 0x7002703;\n  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in 06-6a-06) from revision\n    0xd000389 up to 0xd0003b9;\n  - Update of 06-6c-01/0x10 (ICL-D B0) microcode (in 06-6c-01) from revision\n    0x1000211 up to 0x1000268;\n  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in 06-7e-05) from revision\n    0xb8 up to 0xc2;\n  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode (in 06-8a-01) from revision\n    0x32 up to 0x33;\n  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in 06-8c-01) from\n    revision 0xa6 up to 0xb4;\n  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in 06-8c-02) from revision\n    0x28 up to 0x34;\n  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in 06-8d-01) from revision\n    0x42 up to 0x4e;\n  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in 06-8e-09) from\n    revision 0xf0 up to 0xf4;\n  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in 06-8e-09) from\n    revision 0xf0 up to 0xf4;\n  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in 06-8e-0a)\n    from revision 0xf0 up to 0xf4;\n  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in 06-8e-0b) from revision\n    0xf0 up to 0xf4;\n  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode\n    (in 06-8e-0c) from revision 0xf4 up to 0xf8;\n  - Update of 06-8f-04/0x10 microcode (in 06-8f-04) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-04) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-04) from revision\n    0x2c000170 up to 0x2c000290;\n  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-04) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-06/0x10 microcode (in 06-8f-04) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-04) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-04) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision\n    0x2c000290;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision\n    0x2c000290;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision\n    0x2c000170;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision\n    0x2c000170;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at\n    revision 0x2b0004d0;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at\n    revision 0x2b0004d0;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision\n    0x2b000181;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision\n    0x2b000181;\n  - Update of 06-8f-04/0x10 microcode (in 06-8f-05) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-05) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-05) from revision\n    0x2c000170 up to 0x2c000290;\n  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-05) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-06/0x10 microcode (in 06-8f-05) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-05) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-05) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision\n    0x2c000290;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision\n    0x2c000290;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision\n    0x2c000170;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision\n    0x2c000170;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at\n    revision 0x2b0004d0;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at\n    revision 0x2b0004d0;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision\n    0x2b000181;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision\n    0x2b000181;\n  - Update of 06-8f-04/0x10 microcode (in 06-8f-06) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-06) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-06) from revision\n    0x2c000170 up to 0x2c000290;\n  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-06) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-06/0x10 microcode (in 06-8f-06) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-06) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-06) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision\n    0x2c000290;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision\n    0x2c000290;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision\n    0x2c000170;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision\n    0x2c000170;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at\n    revision 0x2b0004d0;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at\n    revision 0x2b0004d0;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision\n    0x2b000181;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision\n    0x2b000181;\n  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-07) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-07) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-07) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-07) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at\n    revision 0x2b0004d0;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at\n    revision 0x2b0004d0;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision\n    0x2b000181;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision\n    0x2b000181;\n  - Update of 06-8f-04/0x10 microcode (in 06-8f-08) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-08) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-08) from revision\n    0x2c000170 up to 0x2c000290;\n  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-08) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-06/0x10 microcode (in 06-8f-08) from revision 0x2c000170 up\n    to 0x2c000290;\n  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-08) from revision\n    0x2b000181 up to 0x2b0004d0;\n  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-08) from\n    revision 0x2b000181 up to 0x2b0004d0;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision\n    0x2c000290;\n  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision\n    0x2c000290;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision\n    0x2c000170;\n  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision\n    0x2c000170;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at\n    revision 0x2b0004d0;\n  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at\n    revision 0x2b0004d0;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision\n    0x2b000181;\n  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision\n    0x2b000181;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at\n    revision 0x32;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at\n    revision 0x32;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at\n    revision 0x2c;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at\n    revision 0x2c;\n  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-02) from\n    revision 0x2c up to 0x32;\n  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2c\n    up to 0x32;\n  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2c\n    up to 0x32;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at\n    revision 0x32;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at\n    revision 0x32;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at\n    revision 0x2c;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at\n    revision 0x2c;\n  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-05) from\n    revision 0x2c up to 0x32;\n  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2c\n    up to 0x32;\n  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2c\n    up to 0x32;\n  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at\n    revision 0x430;\n  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at\n    revision 0x430;\n  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at\n    revision 0x429;\n  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at\n    revision 0x429;\n  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-03) from\n    revision 0x429 up to 0x430;\n  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at\n    revision 0x430;\n  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at\n    revision 0x430;\n  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at\n    revision 0x429;\n  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at\n    revision 0x429;\n  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-04) from\n    revision 0x429 up to 0x430;\n  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in 06-9e-09)\n    from revision 0xf0 up to 0xf4;\n  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in 06-9e-0a) from\n    revision 0xf0 up to 0xf4;\n  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in 06-9e-0b) from\n    revision 0xf0 up to 0xf4;\n  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in 06-9e-0c) from\n    revision 0xf0 up to 0xf4;\n  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in 06-9e-0d) from\n    revision 0xf4 up to 0xfa;\n  - Update of 06-a5-02/0x20 (CML-H R1) microcode (in 06-a5-02) from revision\n    0xf4 up to 0xf8;\n  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode (in 06-a5-03) from\n    revision 0xf4 up to 0xf8;\n  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode (in 06-a5-05) from\n    revision 0xf4 up to 0xf8;\n  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode (in 06-a6-00) from\n    revision 0xf4 up to 0xf8;\n  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode (in 06-a6-01) from\n    revision 0xf4 up to 0xf8;\n  - Update of 06-a7-01/0x02 (RKL-S B0) microcode (in 06-a7-01) from revision\n    0x57 up to 0x5d;\n  - Update of 06-b7-01/0x32 (RPL-S S0) microcode (in 06-b7-01) from revision\n    0x112 up to 0x11d;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at\n    revision 0x32;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at\n    revision 0x32;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at\n    revision 0x2c;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at\n    revision 0x2c;\n  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-02) from\n    revision 0x2c up to 0x32;\n  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2c\n    up to 0x32;\n  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2c\n    up to 0x32;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at\n    revision 0x32;\n  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at\n    revision 0x32;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at\n    revision 0x2c;\n  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at\n    revision 0x2c;\n  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-05) from\n    revision 0x2c up to 0x32;\n  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2c\n    up to 0x32;\n  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2c\n    up to 0x32;\n- gen_update2.py was updated to output strings having restricted length.",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2023/clsa-2023_1701444720.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-05T11:32:31Z",
      "generator": {
        "date": "2026-05-05T11:32:31Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2023:1701444720",
      "initial_release_date": "2023-12-01T10:32:02Z",
      "revision_history": [
        {
          "date": "2023-12-01T10:32:02Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-05-05T11:32:31Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "microcode_ctl: Fix of 4 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64",
                  "product_id": "microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/microcode_ctl@2.1-73.16.el7_9.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-41804",
      "cwe": {
        "id": "CWE-1334",
        "name": "Unauthorized Error Injection Can Degrade Hardware Redundancy"
      },
      "notes": [
        {
          "category": "description",
          "text": "Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-41804"
        },
        {
          "category": "external",
          "summary": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230915-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20230915-0003/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5474",
          "url": "https://www.debian.org/security/2023/dsa-5474"
        }
      ],
      "release_date": "2023-08-11T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-12-01T10:32:02Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720",
          "product_ids": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-40982",
      "cwe": {
        "id": "CWE-1342",
        "name": "Information Exposure through Microarchitectural State after Transient Execution"
      },
      "notes": [
        {
          "category": "description",
          "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-40982"
        },
        {
          "category": "external",
          "summary": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/7027704",
          "url": "https://access.redhat.com/solutions/7027704"
        },
        {
          "category": "external",
          "summary": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/",
          "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"
        },
        {
          "category": "external",
          "summary": "https://downfall.page",
          "url": "https://downfall.page/"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230811-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20230811-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5474",
          "url": "https://www.debian.org/security/2023/dsa-5474"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5475",
          "url": "https://www.debian.org/security/2023/dsa-5475"
        },
        {
          "category": "external",
          "summary": "https://xenbits.xen.org/xsa/advisory-435.html",
          "url": "https://xenbits.xen.org/xsa/advisory-435.html"
        },
        {
          "category": "external",
          "summary": "http://xenbits.xen.org/xsa/advisory-435.html",
          "url": "http://xenbits.xen.org/xsa/advisory-435.html"
        }
      ],
      "release_date": "2023-08-11T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-12-01T10:32:02Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720",
          "product_ids": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-23908",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "description",
          "text": "Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-23908"
        },
        {
          "category": "external",
          "summary": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230824-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20230824-0003/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5474",
          "url": "https://www.debian.org/security/2023/dsa-5474"
        }
      ],
      "release_date": "2023-08-11T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-12-01T10:32:02Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720",
          "product_ids": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-23583",
      "cwe": {
        "id": "CWE-1281",
        "name": "Sequence of Processor Instructions Leads to Unexpected Behavior"
      },
      "notes": [
        {
          "category": "description",
          "text": "Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-23583"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/11/14/4",
          "url": "http://www.openwall.com/lists/oss-security/2023/11/14/4"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/11/14/5",
          "url": "http://www.openwall.com/lists/oss-security/2023/11/14/5"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/11/14/6",
          "url": "http://www.openwall.com/lists/oss-security/2023/11/14/6"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/11/14/7",
          "url": "http://www.openwall.com/lists/oss-security/2023/11/14/7"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/11/14/8",
          "url": "http://www.openwall.com/lists/oss-security/2023/11/14/8"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/11/14/9",
          "url": "http://www.openwall.com/lists/oss-security/2023/11/14/9"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20231116-0015/",
          "url": "https://security.netapp.com/advisory/ntap-20231116-0015/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5563",
          "url": "https://www.debian.org/security/2023/dsa-5563"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html"
        }
      ],
      "release_date": "2023-11-14T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-12-01T10:32:02Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720",
          "product_ids": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2023:1701444720"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:microcode_ctl-2:2.1-73.16.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}