Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

17 vulnerabilities found for microcode by intel

VAR-201905-0710

Vulnerability from variot - Updated: 2026-04-10 23:30

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors are all products of Intel Corporation of the United States. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Xeon Processor E7 v4 Family is a Xeon E7 series server central processing unit (CPU). Intel Xeon Processor E5 v4 Family is a Xeon E5 series server central processing unit (CPU). Information disclosure vulnerabilities exist in several Intel products. This vulnerability stems from configuration errors in network systems or products during operation. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. The vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. Intel has confirmed the vulnerability and released software updates. Description:

The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

This update provides additional support for some Sandybridge server and Core-X CPUs which were not covered in the original May microcode release. For a list of specific CPU models now supported please refer to the entries listed under CPUID 206D6 and 206D7 at https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

For the stable distribution (stretch), these problems have been fixed in version 3.20190618.1~deb9u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl0LKeoACgkQEMKTtsN8 TjZNtxAAi0dfmsv3xJXYXa/UIG7ayCCdywg7bfYUIFh7eaz5K9IUdq1RRea+qPsd BKzBaWDDGl6+YyZJibFD+JYjrxvHOEWtVrJPuoco2Z34nKkEJDieoFtQjjeZ61ik S9iT2zWnTQa+VixIdJuYBS9z1Rakf58SU/IpNKxZ33eaJ+isAe9KQLO0OyD/d9qN x56EQyAmSOx44IrzkHegIchFNaV2fvScoJ1kVg21FMKWi96P4GTU7jw2UWzNepVs 6yrXfTSaPWUbSg93D24i0FXVce9m35OP7SosdkIyDU5fRfHGxTPxDFnXa2PmY71j uBniE6oUe75Fh9tZpNCQoL9e08463pZjjETcTBxMKYF+Q9/3OwIeRfYCd39gLlsP H3GNW8bLzxrntWquRazthkvfkTP+H9QG7E3ibeR/YX7l2aS5p8e6fs2OP57g3NCI ZJPrhrPstYJ6NhESUVi2N/QAiaOj4pBsel8bvIKyanGvWcNkonM5FV4tjfXm0GHx ZfIiBANF5aLh/pAkd5uDzxyH5xKhM/F0FRlDyqHjb2BuyoG3B2GLe2lXgkIhAR20 JmbPk9S/d15GNC9ndr+XFOkU6+IDgC7glSf0PLuRli7db6u6US1Ch+cS4k5mTzWS 7/Run+QoeSzZjIBvF6aamMZfWxISOHyvV+5b/cWGbfX4wqyppHQ= =VGab -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2019:1178-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1178 Issue date: 2019-05-14 CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 =====================================================================

  1. Summary:

An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

  • A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)

  • Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)

  • Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2019-11091)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) 1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) 1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) 1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: qemu-kvm-1.5.3-160.el7_6.2.src.rpm

x86_64: qemu-img-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source: qemu-kvm-1.5.3-160.el7_6.2.src.rpm

x86_64: qemu-img-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: qemu-kvm-1.5.3-160.el7_6.2.src.rpm

x86_64: qemu-img-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: qemu-kvm-1.5.3-160.el7_6.2.src.rpm

x86_64: qemu-img-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2018-12126 https://access.redhat.com/security/cve/CVE-2018-12127 https://access.redhat.com/security/cve/CVE-2018-12130 https://access.redhat.com/security/cve/CVE-2019-11091 https://access.redhat.com/security/vulnerabilities/mds https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXNsSltzjgjWX9erEAQgcFA/8DBugTza3qjoCHbrEa6YVc6QqGGsWdtds RH+AwYirPLgQRbQznCCVI/6AyYIdXTQDHyLNyRfbKb1nl4LMMcRHVFlTdkggCobS 3jUz1vguDv+nZdWCf0J3NuuKSC8Z9xmx0FRLUJLu07r1a3A3MnlFUMO/AOr9psna C9dnfvRD7YtbFh7TxXUalYoEexIQ3LRjCZsmRyiEzcdv8/6+s2sgDCf0aeBHIEbL EvfgmkNNqgM73ZHEoEwwcFxdWvv6CZJrKVDH3ykrWwPmbdGr5FuBONqZ8UESVmHK vCxcMP1J2HKHwG/irBNShSOcYKwePhBT+35hf8mPPJFUvCxqXuLDHt71OelQmF5z vykmsKtlrcBLodFbMrpV9lSTbZAHSAvlpqe3LjzfetWKuVMvfGlMrx4Mtfq8Avhj R9cSAAmVqj6gEuoV2s5VIaZCcRuSXVPjwJY+m+br0qTT+kymmi05cgsy7bfPvGkG rRo58yZvj6pcAJ1AoXFebTBHlSXtAPVv+VQD5BkF1BhSI8iIhn2cQNB6HM3AocHQ IVtkUvq7Yocwt0IFwoF+JmSjtKzxggDFoYrlztqbMHQ2+VIp2/aDSdcoh2r4cyuz PBAAO+VMfsJpoDAP62GdCILayzGGQV0cY3Xam/0hwFJDGmDJzuqB73yQawhmSIrT vcx66izbyys= =AYjv -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-3978-1 May 14, 2019

qemu update

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM

Summary:

Several issues were addressed in QEMU.

Software Description: - qemu: Machine emulator and virtualizer

Details:

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12130)

Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12127)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12126)

Kurtis Miller discovered that a buffer overflow existed in QEMU when loading a device tree blob. A local attacker could use this to execute arbitrary code. (CVE-2018-20815)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11091)

It was discovered that a NULL pointer dereference existed in the sun4u power device implementation in QEMU. A local attacker could use this to cause a denial of service. This issue only affected Ubuntu 18.10 and Ubuntu 19.04. (CVE-2019-5008)

William Bowling discovered that an information leak existed in the SLiRP networking implementation of QEMU. An attacker could use this to expose sensitive information. (CVE-2019-9824)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04: qemu 1:3.1+dfsg-2ubuntu3.1 qemu-system-x86 1:3.1+dfsg-2ubuntu3.1

Ubuntu 18.10: qemu 1:2.12+dfsg-3ubuntu8.7 qemu-system-x86 1:2.12+dfsg-3ubuntu8.7

Ubuntu 18.04 LTS: qemu 1:2.11+dfsg-1ubuntu7.13 qemu-system-x86 1:2.11+dfsg-1ubuntu7.13

Ubuntu 16.04 LTS: qemu 1:2.5+dfsg-5ubuntu10.38 qemu-system-x86 1:2.5+dfsg-5ubuntu10.38

Ubuntu 14.04 ESM: qemu 2.0.0+dfsg-2ubuntu1.46 qemu-system-x86 2.0.0+dfsg-2ubuntu1.46

After a standard system update you need to restart all QEMU virtual machines to make all the necessary changes.

Software Description: - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM

Details:

USN-3983-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS.

Please note that fully mitigating the Microarchitectural Data Sampling (MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. (CVE-2019-11091)

4

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "29"
      },
      {
        "_id": null,
        "model": "microarchitectural load port data sampling",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-12127"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152902"
      },
      {
        "db": "PACKETSTORM",
        "id": "152887"
      },
      {
        "db": "PACKETSTORM",
        "id": "152892"
      },
      {
        "db": "PACKETSTORM",
        "id": "152907"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2018-12127",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2018-12127",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "VHN-122055",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.1,
            "id": "CVE-2018-12127",
            "impactScore": 4.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-12127",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201905-622",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-122055",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-12127",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122055"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-12127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12127"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors are all products of Intel Corporation of the United States. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Xeon Processor E7 v4 Family is a Xeon E7 series server central processing unit (CPU). Intel Xeon Processor E5 v4 Family is a Xeon E5 series server central processing unit (CPU). Information disclosure vulnerabilities exist in several Intel products. This vulnerability stems from configuration errors in network systems or products during operation. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. \nThe vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks. \nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. \nIntel has confirmed the vulnerability and released software updates. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems. \n\nThis update provides additional support for some Sandybridge server\nand Core-X CPUs which were not covered in the original May microcode\nrelease. For a list of specific CPU models now supported please refer\nto the entries listed under CPUID 206D6 and 206D7 at\nhttps://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 3.20190618.1~deb9u1. \n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n7/Run+QoeSzZjIBvF6aamMZfWxISOHyvV+5b/cWGbfX4wqyppHQ=\n=VGab\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: qemu-kvm security update\nAdvisory ID:       RHSA-2019:1178-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2019:1178\nIssue date:        2019-05-14\nCVE Names:         CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 \n                   CVE-2019-11091 \n=====================================================================\n\n1. Summary:\n\nAn update for qemu-kvm is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm packages provide the\nuser-space component for running virtual machines that use KVM. \n\nSecurity Fix(es):\n\n* A flaw was found in the implementation of the \"fill buffer\", a mechanism\nused by modern CPUs when a cache-miss is made on L1 CPU cache. If an\nattacker can generate a load operation that would create a page fault, the\nexecution will continue speculatively with incorrect data from the fill\nbuffer while the data is fetched from higher level caches. This response\ntime can be measured to infer data in the fill buffer. (CVE-2018-12130)\n\n* Modern Intel microprocessors implement hardware-level micro-optimizations\nto improve the performance of writing data back to CPU caches. The write\noperation is split into STA (STore Address) and STD (STore Data)\nsub-operations. These sub-operations allow the processor to hand-off\naddress generation logic into these sub-operations for optimized writes. \nBoth of these sub-operations write to a shared distributed processor\nstructure called the \u0027processor store buffer\u0027. As a result, an unprivileged\nattacker could use this flaw to read private data resident within the CPU\u0027s\nprocessor store buffer. (CVE-2018-12126)\n\n* Microprocessors use a \u2018load port\u2019 subcomponent to perform load operations\nfrom memory or IO. During a load operation, the load port receives data\nfrom the memory or IO subsystem and then provides the data to the CPU\nregisters and operations in the CPU\u2019s pipelines. Stale load operations\nresults are stored in the \u0027load port\u0027 table until overwritten by newer\noperations. Certain load-port operations triggered by an attacker can be\nused to reveal data about previous stale requests leaking data back to the\nattacker via a timing side-channel. (CVE-2019-11091)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)\n1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)\n1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)\n1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nqemu-kvm-1.5.3-160.el7_6.2.src.rpm\n\nx86_64:\nqemu-img-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nSource:\nqemu-kvm-1.5.3-160.el7_6.2.src.rpm\n\nx86_64:\nqemu-img-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nqemu-kvm-1.5.3-160.el7_6.2.src.rpm\n\nx86_64:\nqemu-img-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nqemu-kvm-1.5.3-160.el7_6.2.src.rpm\n\nx86_64:\nqemu-img-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-debuginfo-1.5.3-160.el7_6.2.x86_64.rpm\nqemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-12126\nhttps://access.redhat.com/security/cve/CVE-2018-12127\nhttps://access.redhat.com/security/cve/CVE-2018-12130\nhttps://access.redhat.com/security/cve/CVE-2019-11091\nhttps://access.redhat.com/security/vulnerabilities/mds\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nvcx66izbyys=\n=AYjv\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nUbuntu Security Notice USN-3978-1\nMay 14, 2019\n\nqemu update\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.04\n- Ubuntu 18.10\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral issues were addressed in QEMU. \n\nSoftware Description:\n- qemu: Machine emulator and virtualizer\n\nDetails:\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan\nHorea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa\nMilburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,\nCristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss\ndiscovered that memory previously stored in microarchitectural fill buffers\nof an Intel CPU core may be exposed to a malicious process that is\nexecuting on the same CPU core. A local attacker could use this to expose\nsensitive information. (CVE-2018-12130)\n\nBrandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan\nvan Schaik, Alyssa Milburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh\nRazavi, Herbert Bos, and Cristiano Giuffrida discovered that memory\npreviously stored in microarchitectural load ports of an Intel CPU core may\nbe exposed to a malicious process that is executing on the same CPU core. A\nlocal attacker could use this to expose sensitive information. \n(CVE-2018-12127)\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel\nMoghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel\nGruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory\npreviously stored in microarchitectural store buffers of an Intel CPU core\nmay be exposed to a malicious process that is executing on the same CPU\ncore. A local attacker could use this to expose sensitive information. \n(CVE-2018-12126)\n\nKurtis Miller discovered that a buffer overflow existed in QEMU when\nloading a device tree blob. A local attacker could use this to execute\narbitrary code. (CVE-2018-20815)\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,\nMoritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa\nMilburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and\nCristiano Giuffrida discovered that uncacheable memory previously stored in\nmicroarchitectural buffers of an Intel CPU core may be exposed to a\nmalicious process that is executing on the same CPU core. A local attacker\ncould use this to expose sensitive information. (CVE-2019-11091)\n\nIt was discovered that a NULL pointer dereference existed in the sun4u\npower device implementation in QEMU. A local attacker could use this\nto cause a denial of service. This issue only affected Ubuntu 18.10\nand Ubuntu 19.04. (CVE-2019-5008)\n\nWilliam Bowling discovered that an information leak existed in the SLiRP\nnetworking implementation of QEMU. An attacker could use this to expose\nsensitive information. (CVE-2019-9824)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.04:\n  qemu                            1:3.1+dfsg-2ubuntu3.1\n  qemu-system-x86                 1:3.1+dfsg-2ubuntu3.1\n\nUbuntu 18.10:\n  qemu                            1:2.12+dfsg-3ubuntu8.7\n  qemu-system-x86                 1:2.12+dfsg-3ubuntu8.7\n\nUbuntu 18.04 LTS:\n  qemu                            1:2.11+dfsg-1ubuntu7.13\n  qemu-system-x86                 1:2.11+dfsg-1ubuntu7.13\n\nUbuntu 16.04 LTS:\n  qemu                            1:2.5+dfsg-5ubuntu10.38\n  qemu-system-x86                 1:2.5+dfsg-5ubuntu10.38\n\nUbuntu 14.04 ESM:\n  qemu                            2.0.0+dfsg-2ubuntu1.46\n  qemu-system-x86                 2.0.0+dfsg-2ubuntu1.46\n\nAfter a standard system update you need to restart all QEMU virtual\nmachines to make all the necessary changes. \n\nSoftware Description:\n- linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM\n\nDetails:\n\nUSN-3983-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04\nLTS. \n\nPlease note that fully mitigating the Microarchitectural Data Sampling\n(MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and\nCVE-2019-11091) requires corresponding processor microcode/firmware\nupdates or, in virtual environments, hypervisor updates. (CVE-2019-11091)\n\n4",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-12127"
      },
      {
        "db": "VULHUB",
        "id": "VHN-122055"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-12127"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152962"
      },
      {
        "db": "PACKETSTORM",
        "id": "152902"
      },
      {
        "db": "PACKETSTORM",
        "id": "153379"
      },
      {
        "db": "PACKETSTORM",
        "id": "152887"
      },
      {
        "db": "PACKETSTORM",
        "id": "152892"
      },
      {
        "db": "PACKETSTORM",
        "id": "152918"
      },
      {
        "db": "PACKETSTORM",
        "id": "152939"
      },
      {
        "db": "PACKETSTORM",
        "id": "152907"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-12127",
        "trust": 2.8
      },
      {
        "db": "PACKETSTORM",
        "id": "155281",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-616472",
        "trust": 1.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-608355",
        "trust": 1.2
      },
      {
        "db": "MCAFEE",
        "id": "SB10292",
        "trust": 1.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622",
        "trust": 0.7
      },
      {
        "db": "LENOVO",
        "id": "LEN-26696",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1754",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0153",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1705",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1737.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0127",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1812",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4358",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4321",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "155956",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "156920",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "152952",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "152942",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "108330",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-122055",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-12127",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152911",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152904",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152962",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152902",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "153379",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152887",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152892",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152918",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152939",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152907",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122055"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-12127"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152962"
      },
      {
        "db": "PACKETSTORM",
        "id": "152902"
      },
      {
        "db": "PACKETSTORM",
        "id": "153379"
      },
      {
        "db": "PACKETSTORM",
        "id": "152887"
      },
      {
        "db": "PACKETSTORM",
        "id": "152892"
      },
      {
        "db": "PACKETSTORM",
        "id": "152918"
      },
      {
        "db": "PACKETSTORM",
        "id": "152939"
      },
      {
        "db": "PACKETSTORM",
        "id": "152907"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12127"
      }
    ]
  },
  "id": "VAR-201905-0710",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122055"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2026-04-10T23:30:52.435000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "linux kernel Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92582"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/05/14/intel_hyper_threading_mitigations/"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191167 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191179 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191168 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191202 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191200 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191171 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-rt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191176 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191186 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191197 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191195 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: redhat-virtualization-host security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191207 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191185 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191199 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191201 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: rhvm-setup-plugins security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191206 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191183 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191178 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191177 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191198 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191193 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191180 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: rhvm-appliance security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191208 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191189 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191182 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191184 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191172 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: redhat-virtualization-host security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191209 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191181 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-rt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191174 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191155 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: vdsm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191203 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191187 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: rhvm-setup-plugins security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191205 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191169 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: vdsm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191204 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191188 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191196 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191194 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Advanced Virtualization security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191455 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2018-12127",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2018-12127"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3983-1"
      },
      {
        "title": "Debian Security Advisories: DSA-4444-1 linux -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=c960cd2c4c663bee4208c29f78956570"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-288: x86: Inconsistent PV IOMMU discipline",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5e6e0619bc9879769e2dc27651292ba1"
      },
      {
        "title": "Ubuntu Security Notice: intel-microcode update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-3"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3983-2"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192553 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: virt:rhel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191175 - Security Advisory"
      },
      {
        "title": "Debian Security Advisories: DSA-4447-1 intel-microcode -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=783d5f8f3ad6bd4b472bac87f78daf39"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-292: x86: insufficient TLB flushing when using PCID",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6f420d7ce4edc488c67e4f105805e662"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-293: x86: PV kernel context switch corruption",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6489072c7d814c3eeb410e3c3014742f"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-287: x86: steal_page violates page_struct access discipline",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2265e0ec672f9854d200348511f0f8de"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a3e8998cea5d5825f10ea1c09276196e"
      },
      {
        "title": "Debian CVElist Bug Report Logs: Xen Hypervisor security update for Intel MDS - XSA 297",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3c5d2f154807c8ff4e324ef14ef12771"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-285: race with pass-through device hotplug",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=58ea80c1aac43705a15b8df06106fc72"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-284: grant table transfer issues on large hosts",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3fb9629013e9105b3361893f58ff13e2"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-291: x86/PV: page type reference counting issue with failed IOMMU update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=24d344e2b0de0f8050341e180d5e3ad6"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-290: missing preemption in x86 PV page table unvalidation",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=eefa90208138c527071b467dedc4d2d8"
      },
      {
        "title": "HP: HPSBHF03618 rev. 1  -  Intel Microarchitectural Data Sampling Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03618"
      },
      {
        "title": "Ubuntu Security Notice: libvirt update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3985-2"
      },
      {
        "title": "Ubuntu Security Notice: libvirt update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3985-1"
      },
      {
        "title": "Ubuntu Security Notice: intel-microcode update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-2"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2019-1260",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1260"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3982-1"
      },
      {
        "title": "Ubuntu Security Notice: intel-microcode update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-1"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3984-1"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=30d0a4e627570cd4d5945ca971daba72"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2019-1205",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1205"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2019-1205",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1205"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191170 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux-hwe, linux-azure vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3980-2"
      },
      {
        "title": "Red Hat: Important: kernel-rt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191190 - Security Advisory"
      },
      {
        "title": "Debian CVElist Bug Report Logs: qemu: CVE-2019-5008",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3a83f6ae99e6b2e0c974ac32c9ef74a2"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-xenial vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3982-2"
      },
      {
        "title": "IBM: IBM Security Bulletin: Vulnerabilities in Intel CPUs affect IBM Integrated Analytics System",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=c47b16f3ebd0fdbec9f73e7f3324fed3"
      },
      {
        "title": "IBM: IBM Security Bulletin: IBM has released Unified Extensible Firmware Interface (UEFI) fixes in response to Intel Microarchitectural Data Sampling (MDS) Side Channel vulnerabilities.",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=bc9f36e4b0d29a9ca06baf362fd957d0"
      },
      {
        "title": "Debian Security Advisories: DSA-4564-1 linux -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=6a2efed9e3fbb73861bbf72b19140077"
      },
      {
        "title": "IBM: IBM Addresses Reported Intel Security Vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=ab73c937cee32c79f9fc9bc6ef3cc36d"
      },
      {
        "title": "Debian Security Advisories: DSA-4469-1 libvirt -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=4e2fe5b482468cc28e671437a04edddc"
      },
      {
        "title": "Ubuntu Security Notice: qemu update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3978-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3981-2"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3981-1"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/j1nh0/pdf "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/j1nh0/nisol "
      },
      {
        "title": "Windows-Specture-Meltdown-Mitigation-Script",
        "trust": 0.1,
        "url": "https://github.com/simeononsecurity/Windows-Specture-Meltdown-Mitigation-Script "
      },
      {
        "title": "Windows-Spectre-Meltdown-Mitigation-Script",
        "trust": 0.1,
        "url": "https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/kali973/spectre-meltdown-checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/es0j/hyperbleed "
      },
      {
        "title": "puppet-meltdown",
        "trust": 0.1,
        "url": "https://github.com/timidri/puppet-meltdown "
      },
      {
        "title": "cSpeculationControlFixes",
        "trust": 0.1,
        "url": "https://github.com/poshsecurity/cSpeculationControlFixes "
      },
      {
        "title": "Linux-Tools",
        "trust": 0.1,
        "url": "https://github.com/minutesinch/Linux-Tools "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/merlinepedra25/spectre-meltdown-checker "
      },
      {
        "title": "spectre-meltdown",
        "trust": 0.1,
        "url": "https://github.com/edsonjt81/spectre-meltdown "
      },
      {
        "title": "spectre-meltdown-checker",
        "trust": 0.1,
        "url": "https://github.com/speed47/spectre-meltdown-checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/merlinepedra/spectre-meltdown-checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/kin-cho/my-spectre-meltdown-checker "
      },
      {
        "title": "Firmware-Security",
        "trust": 0.1,
        "url": "https://github.com/virusbeeE/Firmware-Security "
      },
      {
        "title": "Hardware-and-Firmware-Security-Guidance",
        "trust": 0.1,
        "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance "
      },
      {
        "title": "hardware-attacks-state-of-the-art",
        "trust": 0.1,
        "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art "
      },
      {
        "title": "ansible-everyday",
        "trust": 0.1,
        "url": "https://github.com/kaosagnt/ansible-everyday "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/intel-zombieload-side-channel-attack-10-takeaways/144771/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/apple-patches-intel-side-channel-ios-macos/144743/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/intel-cpus-impacted-by-new-class-of-spectre-like-attacks/144728/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-12127"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122055"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12127"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.debian.org/security/2020/dsa-4602"
      },
      {
        "trust": 1.8,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc"
      },
      {
        "trust": 1.8,
        "url": "http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html"
      },
      {
        "trust": 1.2,
        "url": "https://seclists.org/bugtraq/2019/jun/28"
      },
      {
        "trust": 1.2,
        "url": "https://seclists.org/bugtraq/2019/jun/36"
      },
      {
        "trust": 1.2,
        "url": "https://seclists.org/bugtraq/2019/nov/16"
      },
      {
        "trust": 1.2,
        "url": "https://seclists.org/bugtraq/2019/nov/15"
      },
      {
        "trust": 1.2,
        "url": "https://seclists.org/bugtraq/2020/jan/21"
      },
      {
        "trust": 1.2,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt"
      },
      {
        "trust": 1.2,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en"
      },
      {
        "trust": 1.2,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
      },
      {
        "trust": 1.2,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf"
      },
      {
        "trust": 1.2,
        "url": "https://www.synology.com/security/advisory/synology_sa_19_24"
      },
      {
        "trust": 1.2,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-19:07.mds.asc"
      },
      {
        "trust": 1.2,
        "url": "https://security.gentoo.org/glsa/202003-56"
      },
      {
        "trust": 1.2,
        "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/errata/rhsa-2019:1455"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/errata/rhsa-2019:2553"
      },
      {
        "trust": 1.2,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html"
      },
      {
        "trust": 1.2,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html"
      },
      {
        "trust": 1.2,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html"
      },
      {
        "trust": 1.2,
        "url": "https://usn.ubuntu.com/3977-3/"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-11091"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2018-12127"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2018-12130"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2018-12126"
      },
      {
        "trust": 1.2,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn"
      },
      {
        "trust": 1.1,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10292"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12126"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11091"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12127"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12130"
      },
      {
        "trust": 0.6,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/vulnerabilities/mds"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.6,
        "url": "http://xenbits.xen.org/xsa/advisory-297.html"
      },
      {
        "trust": 0.6,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013"
      },
      {
        "trust": 0.6,
        "url": "https://www.vmware.com/security/advisories/vmsa-2019-0008.html"
      },
      {
        "trust": 0.6,
        "url": "https://aws.amazon.com/security/security-bulletins/aws-2019-004/"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781"
      },
      {
        "trust": 0.6,
        "url": "http://www.intel.com/content/www/us/en/homepage.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.chromium.org/chromium-os/mds-on-chromeos"
      },
      {
        "trust": 0.6,
        "url": "https://securityadvisories.paloaltonetworks.com/home/detail/150"
      },
      {
        "trust": 0.6,
        "url": "https://support.citrix.com/article/ctx251995"
      },
      {
        "trust": 0.6,
        "url": "https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-chrome-os-m75.html"
      },
      {
        "trust": 0.6,
        "url": "https://usn.ubuntu.com/3985-1/"
      },
      {
        "trust": 0.6,
        "url": "http://www.debian.org/security/2019/dsa-4444"
      },
      {
        "trust": 0.6,
        "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00018.html"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/en-us/ht210119"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/156920/gentoo-linux-security-advisory-202003-56.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/intel-amd-processors-information-disclosure-via-performance-measurement-29300"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/80874"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4358/"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/1118439"
      },
      {
        "trust": 0.6,
        "url": "https://www.securityfocus.com/bid/108330"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0127/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4321/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/81098"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/81030"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-26696"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0153/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/152952/ubuntu-security-notice-usn-3985-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/1107009"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/155956/debian-security-advisory-4602-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1812/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/152942/debian-security-advisory-4447-1.html"
      },
      {
        "trust": 0.3,
        "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/mds"
      },
      {
        "trust": 0.1,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10292"
      },
      {
        "trust": 0.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/200.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=60201"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/3983-1/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1187"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1197"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3985-2"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3985-1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1189"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/intel-microcode"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/sa00233-microcode-update-guidance_05132019.pdf"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1178"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1195"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.38"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9824"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20815"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/qemu/1:2.12+dfsg-3ubuntu8.7"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3978-1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5008"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/qemu/1:3.1+dfsg-2ubuntu3.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.13"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3983-1"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3983-2"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1202"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-122055"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-12127"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152962"
      },
      {
        "db": "PACKETSTORM",
        "id": "152902"
      },
      {
        "db": "PACKETSTORM",
        "id": "153379"
      },
      {
        "db": "PACKETSTORM",
        "id": "152887"
      },
      {
        "db": "PACKETSTORM",
        "id": "152892"
      },
      {
        "db": "PACKETSTORM",
        "id": "152918"
      },
      {
        "db": "PACKETSTORM",
        "id": "152939"
      },
      {
        "db": "PACKETSTORM",
        "id": "152907"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12127"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-122055",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-12127",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152911",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152904",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152962",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152902",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "153379",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152887",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152892",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152918",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152939",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152907",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-12127",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-05-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-122055",
        "ident": null
      },
      {
        "date": "2019-05-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-12127",
        "ident": null
      },
      {
        "date": "2019-05-15T15:29:05",
        "db": "PACKETSTORM",
        "id": "152911",
        "ident": null
      },
      {
        "date": "2019-05-15T15:23:42",
        "db": "PACKETSTORM",
        "id": "152904",
        "ident": null
      },
      {
        "date": "2019-05-17T13:13:13",
        "db": "PACKETSTORM",
        "id": "152962",
        "ident": null
      },
      {
        "date": "2019-05-15T15:23:12",
        "db": "PACKETSTORM",
        "id": "152902",
        "ident": null
      },
      {
        "date": "2019-06-21T19:32:22",
        "db": "PACKETSTORM",
        "id": "153379",
        "ident": null
      },
      {
        "date": "2019-05-15T15:18:55",
        "db": "PACKETSTORM",
        "id": "152887",
        "ident": null
      },
      {
        "date": "2019-05-15T15:20:24",
        "db": "PACKETSTORM",
        "id": "152892",
        "ident": null
      },
      {
        "date": "2019-05-15T15:32:50",
        "db": "PACKETSTORM",
        "id": "152918",
        "ident": null
      },
      {
        "date": "2019-05-15T15:56:00",
        "db": "PACKETSTORM",
        "id": "152939",
        "ident": null
      },
      {
        "date": "2019-05-15T15:24:32",
        "db": "PACKETSTORM",
        "id": "152907",
        "ident": null
      },
      {
        "date": "2019-05-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-622",
        "ident": null
      },
      {
        "date": "2019-05-30T16:29:00.903000",
        "db": "NVD",
        "id": "CVE-2018-12127",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-06-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-122055",
        "ident": null
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-12127",
        "ident": null
      },
      {
        "date": "2021-10-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-622",
        "ident": null
      },
      {
        "date": "2024-11-21T03:44:38.757000",
        "db": "NVD",
        "id": "CVE-2018-12127",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "152962"
      },
      {
        "db": "PACKETSTORM",
        "id": "152918"
      },
      {
        "db": "PACKETSTORM",
        "id": "152939"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "_id": null,
    "data": "Multiple Intel Product Information Disclosure Vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "_id": null,
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-622"
      }
    ],
    "trust": 0.6
  }
}

VAR-201905-1248

Vulnerability from variot - Updated: 2026-04-10 22:26

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. The vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. A third-party patch is also available. Description:

The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal. ========================================================================== Ubuntu Security Notice USN-3980-2 May 14, 2019

linux-hwe, linux-azure vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.10 for Ubuntu 18.04 LTS.

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2018-12130)

Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2018-12127)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2018-12126)

Vasily Averin and Evgenii Shatokhin discovered that a use-after-free vulnerability existed in the NFS41+ subsystem when multiple network namespaces are in use. A local attacker in a container could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-16884)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2019-11091)

Matteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups subsystem of the Linux kernel did not properly account for SCTP socket buffers. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-3874)

Alex Williamson discovered that the vfio subsystem of the Linux kernel did not properly limit DMA mappings. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-3882)

Marc Orr discovered that the KVM hypervisor implementation in the Linux kernel did not properly restrict APIC MSR register values when nested virtualization is used. An attacker in a guest vm could use this to cause a denial of service (host OS crash). (CVE-2019-3887)

Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux kernel contained a heap buffer overflow. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-9500)

Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux kernel did not properly prevent remote firmware events from being processed for USB Wifi devices. A physically proximate attacker could use this to send firmware events to the device. (CVE-2019-9503)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS: linux-image-4.18.0-1018-azure 4.18.0-1018.18~18.04.1 linux-image-4.18.0-20-generic 4.18.0-20.21~18.04.1 linux-image-4.18.0-20-generic-lpae 4.18.0-20.21~18.04.1 linux-image-4.18.0-20-lowlatency 4.18.0-20.21~18.04.1 linux-image-4.18.0-20-snapdragon 4.18.0-20.21~18.04.1 linux-image-azure 4.18.0.1018.17 linux-image-generic-hwe-18.04 4.18.0.20.70 linux-image-generic-lpae-hwe-18.04 4.18.0.20.70 linux-image-lowlatency-hwe-18.04 4.18.0.20.70 linux-image-snapdragon-hwe-18.04 4.18.0.20.70 linux-image-virtual-hwe-18.04 4.18.0.20.70

After a standard system update you need to reboot your computer to make all the necessary changes.

Please note that fully mitigating the Microarchitectural Data Sampling (MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. (CVE-2019-11091)

  1. Once all virtual machines have shut down, start them again for this update to take effect. 7.5) - ppc64, ppc64le, s390x, x86_64

  2. Description:

The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Important: kernel security update Advisory ID: RHSA-2019:1168-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1168 Issue date: 2019-05-14 CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 =====================================================================

  1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)

  • Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)

  • Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2019-11091)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) 1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) 1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) 1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: kernel-3.10.0-957.12.2.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm

x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: kernel-3.10.0-957.12.2.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm

x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: kernel-3.10.0-957.12.2.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm

ppc64: kernel-3.10.0-957.12.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.12.2.el7.ppc64.rpm kernel-debug-3.10.0-957.12.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.12.2.el7.ppc64.rpm kernel-devel-3.10.0-957.12.2.el7.ppc64.rpm kernel-headers-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.ppc64.rpm perf-3.10.0-957.12.2.el7.ppc64.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm python-perf-3.10.0-957.12.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm

ppc64le: kernel-3.10.0-957.12.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debug-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.12.2.el7.ppc64le.rpm kernel-devel-3.10.0-957.12.2.el7.ppc64le.rpm kernel-headers-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.12.2.el7.ppc64le.rpm perf-3.10.0-957.12.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm python-perf-3.10.0-957.12.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm

s390x: kernel-3.10.0-957.12.2.el7.s390x.rpm kernel-debug-3.10.0-957.12.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.s390x.rpm kernel-debug-devel-3.10.0-957.12.2.el7.s390x.rpm kernel-debuginfo-3.10.0-957.12.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.12.2.el7.s390x.rpm kernel-devel-3.10.0-957.12.2.el7.s390x.rpm kernel-headers-3.10.0-957.12.2.el7.s390x.rpm kernel-kdump-3.10.0-957.12.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.12.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.12.2.el7.s390x.rpm perf-3.10.0-957.12.2.el7.s390x.rpm perf-debuginfo-3.10.0-957.12.2.el7.s390x.rpm python-perf-3.10.0-957.12.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.s390x.rpm

x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.ppc64.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm

ppc64le: kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm

x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: kernel-3.10.0-957.12.2.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm

x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2018-12126 https://access.redhat.com/security/cve/CVE-2018-12127 https://access.redhat.com/security/cve/CVE-2018-12130 https://access.redhat.com/security/cve/CVE-2019-11091 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/mds

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXNsSddzjgjWX9erEAQiDGRAAo9mifOQBxfgWFR3QSCU6uLW6taihgkQ+ E9S9uNH1yymcF7UoAetYY9RhBPF/dczLoLxhUFeWDZxrsAW0QDuW/lHWwewnk1Cp XjYSj6wMCJqFCzt1g4q8LXzrY0mrKoOZQTuB13rV6wYB0FVAySKUr6pGDUfsmVoD X7Cbwr7dizJqIT6I0Fj9//OlRciyi5Wls5R8r1P9tbznAR1621uuUY5+fsDIkJwz usZmx6HT/a/P4L2AqMUH7iBi159uYg99HdlEFhT94NF1DOHfn15wMiuQidA+b1iy 9y8EJkLvkI6Oyiae7Aq+lsehk1wtZH4D/Fyqy/uPsJEbIdKoa3C4oIMvIaFvczCE INLrNjz5NxJxI8yVF6Hd4P6yy11BO4LvkDWYfAEzLobaAgmXz+ZRT1PjV1hts+kC Y4AzB+ihaNpG4gCj5SES0xYOuwUlva9QWlTGpau2qFCAwgzT9JylYYN7oBnr9VBc 3bSc6uTVQW5TAIoKpIAt6XLeQa4cFhI47HA5iyzoIJKnbxfmh0EWGBYiVhuXINcl wIggLiY8VRr0ZlFykx3XHXHM2Wa4iMS5E48QpL10l1rm93dtumjTIFUdG8eJEgGI 4hUX7anY9A8IyMSPK4McQt19BzAfcWPuKziAcful7jBLtPvhhCRfNjgo9+x+QwK4 ub8jpANp7mM= =Ik8D -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202003-56


                                       https://security.gentoo.org/

Severity: High Title: Xen: Multiple vulnerabilities Date: March 25, 2020 Bugs: #686024, #699048, #699996, #702644 ID: 202003-56


Synopsis

Multiple vulnerabilities have been found in Xen, the worst of which could allow for privilege escalation.

Background

Xen is a bare-metal hypervisor.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 app-emulation/xen < 4.12.0-r1 >= 4.12.0-r1 2 app-emulation/xen-tools < 4.12.0-r1 >= 4.12.0-r1 ------------------------------------------------------------------- 2 affected packages

Description

Multiple vulnerabilities have been discovered in Xen. Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Xen users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.12.0-r1"

References

[ 1 ] CVE-2018-12126 https://nvd.nist.gov/vuln/detail/CVE-2018-12126 [ 2 ] CVE-2018-12127 https://nvd.nist.gov/vuln/detail/CVE-2018-12127 [ 3 ] CVE-2018-12130 https://nvd.nist.gov/vuln/detail/CVE-2018-12130 [ 4 ] CVE-2018-12207 https://nvd.nist.gov/vuln/detail/CVE-2018-12207 [ 5 ] CVE-2018-12207 https://nvd.nist.gov/vuln/detail/CVE-2018-12207 [ 6 ] CVE-2019-11091 https://nvd.nist.gov/vuln/detail/CVE-2019-11091 [ 7 ] CVE-2019-11135 https://nvd.nist.gov/vuln/detail/CVE-2019-11135 [ 8 ] CVE-2019-18420 https://nvd.nist.gov/vuln/detail/CVE-2019-18420 [ 9 ] CVE-2019-18421 https://nvd.nist.gov/vuln/detail/CVE-2019-18421 [ 10 ] CVE-2019-18423 https://nvd.nist.gov/vuln/detail/CVE-2019-18423 [ 11 ] CVE-2019-18424 https://nvd.nist.gov/vuln/detail/CVE-2019-18424 [ 12 ] CVE-2019-18425 https://nvd.nist.gov/vuln/detail/CVE-2019-18425 [ 13 ] CVE-2019-19577 https://nvd.nist.gov/vuln/detail/CVE-2019-19577 [ 14 ] CVE-2019-19578 https://nvd.nist.gov/vuln/detail/CVE-2019-19578 [ 15 ] CVE-2019-19580 https://nvd.nist.gov/vuln/detail/CVE-2019-19580 [ 16 ] CVE-2019-19581 https://nvd.nist.gov/vuln/detail/CVE-2019-19581 [ 17 ] CVE-2019-19582 https://nvd.nist.gov/vuln/detail/CVE-2019-19582 [ 18 ] CVE-2019-19583 https://nvd.nist.gov/vuln/detail/CVE-2019-19583

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/202003-56

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5 . Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "29"
      },
      {
        "_id": null,
        "model": "microarchitectural data sampling uncacheable memory",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "_id": null,
        "model": "xeon scalable processors",
        "scope": null,
        "trust": 0.6,
        "vendor": "intel",
        "version": null
      },
      {
        "_id": null,
        "model": "6th generation core processors",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "0"
      },
      {
        "_id": null,
        "model": "5th generation core processors",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "0"
      },
      {
        "_id": null,
        "model": "4th generation core processors",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "0"
      },
      {
        "_id": null,
        "model": "pentium processor n series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "0"
      },
      {
        "_id": null,
        "model": "pentium processor silver series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "0"
      },
      {
        "_id": null,
        "model": "pentium processor j series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "0"
      },
      {
        "_id": null,
        "model": "xeon processor e3 family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "v60"
      },
      {
        "_id": null,
        "model": "xeon processor e5 family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "v40"
      },
      {
        "_id": null,
        "model": "xeon processor e7 family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "v40"
      },
      {
        "_id": null,
        "model": "xeon processor e3 family",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "intel",
        "version": "v4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11091"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "152917"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152899"
      },
      {
        "db": "PACKETSTORM",
        "id": "153248"
      },
      {
        "db": "PACKETSTORM",
        "id": "152889"
      },
      {
        "db": "PACKETSTORM",
        "id": "152894"
      },
      {
        "db": "PACKETSTORM",
        "id": "152884"
      },
      {
        "db": "PACKETSTORM",
        "id": "152876"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2019-11091",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2019-11091",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CNVD-2019-22234",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "VHN-142703",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.1,
            "id": "CVE-2019-11091",
            "impactScore": 4.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-11091",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-22234",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201905-624",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-142703",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-11091",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11091"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. \nThe vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks. \nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. A third-party patch is also available. Description:\n\nThe RHV-M Virtual Appliance automates the process of installing and\nconfiguring the Red Hat Virtualization Manager. The appliance is available\nto download as an OVA file from the Customer Portal. ==========================================================================\nUbuntu Security Notice USN-3980-2\nMay 14, 2019\n\nlinux-hwe, linux-azure vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \nThis update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 18.10 for Ubuntu\n18.04 LTS. \n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan\nHorea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa\nMilburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,\nCristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss\ndiscovered that memory previously stored in microarchitectural fill buffers\nof an Intel CPU core may be exposed to a malicious process that is\nexecuting on the same CPU core. (CVE-2018-12130)\n\nBrandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan\nvan Schaik, Alyssa Milburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh\nRazavi, Herbert Bos, and Cristiano Giuffrida discovered that memory\npreviously stored in microarchitectural load ports of an Intel CPU core may\nbe exposed to a malicious process that is executing on the same CPU core. \n(CVE-2018-12127)\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel\nMoghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel\nGruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory\npreviously stored in microarchitectural store buffers of an Intel CPU core\nmay be exposed to a malicious process that is executing on the same CPU\ncore. \n(CVE-2018-12126)\n\nVasily Averin and Evgenii Shatokhin discovered that a use-after-free\nvulnerability existed in the NFS41+ subsystem when multiple network\nnamespaces are in use. A local attacker in a container could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-16884)\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,\nMoritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa\nMilburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and\nCristiano Giuffrida discovered that uncacheable memory previously stored in\nmicroarchitectural buffers of an Intel CPU core may be exposed to a\nmalicious process that is executing on the same CPU core. (CVE-2019-11091)\n\nMatteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups\nsubsystem of the Linux kernel did not properly account for SCTP socket\nbuffers. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2019-3874)\n\nAlex Williamson discovered that the vfio subsystem of the Linux kernel did\nnot properly limit DMA mappings. A local attacker could use this to cause a\ndenial of service (memory exhaustion). (CVE-2019-3882)\n\nMarc Orr discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly restrict APIC MSR register values when nested\nvirtualization is used. An attacker in a guest vm could use this to cause a\ndenial of service (host OS crash). (CVE-2019-3887)\n\nHugues Anguelkov discovered that the Broadcom Wifi driver in the Linux\nkernel contained a heap buffer overflow. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-9500)\n\nHugues Anguelkov discovered that the Broadcom Wifi driver in the Linux\nkernel did not properly prevent remote firmware events from being processed\nfor USB Wifi devices. A physically proximate attacker could use this to\nsend firmware events to the device. (CVE-2019-9503)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n  linux-image-4.18.0-1018-azure   4.18.0-1018.18~18.04.1\n  linux-image-4.18.0-20-generic   4.18.0-20.21~18.04.1\n  linux-image-4.18.0-20-generic-lpae  4.18.0-20.21~18.04.1\n  linux-image-4.18.0-20-lowlatency  4.18.0-20.21~18.04.1\n  linux-image-4.18.0-20-snapdragon  4.18.0-20.21~18.04.1\n  linux-image-azure               4.18.0.1018.17\n  linux-image-generic-hwe-18.04   4.18.0.20.70\n  linux-image-generic-lpae-hwe-18.04  4.18.0.20.70\n  linux-image-lowlatency-hwe-18.04  4.18.0.20.70\n  linux-image-snapdragon-hwe-18.04  4.18.0.20.70\n  linux-image-virtual-hwe-18.04   4.18.0.20.70\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nPlease note that fully mitigating the Microarchitectural Data Sampling\n(MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and\nCVE-2019-11091) requires corresponding processor microcode/firmware\nupdates or, in virtual environments, hypervisor updates. Description:\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products. (CVE-2019-11091)\n\n4. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. 7.5) - ppc64, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: kernel security update\nAdvisory ID:       RHSA-2019:1168-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2019:1168\nIssue date:        2019-05-14\nCVE Names:         CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 \n                   CVE-2019-11091 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* A flaw was found in the implementation of the \"fill buffer\", a mechanism\nused by modern CPUs when a cache-miss is made on L1 CPU cache.  If an\nattacker can generate a load operation that would create a page fault, the\nexecution will continue speculatively with incorrect data from the fill\nbuffer while the data is fetched from higher level caches.  This response\ntime can be measured to infer data in the fill buffer. (CVE-2018-12130)\n\n* Modern Intel microprocessors implement hardware-level micro-optimizations\nto improve the performance of writing data back to CPU caches. The write\noperation is split into STA (STore Address) and STD (STore Data)\nsub-operations. These sub-operations allow the processor to hand-off\naddress generation logic into these sub-operations for optimized writes. \nBoth of these sub-operations write to a shared distributed processor\nstructure called the \u0027processor store buffer\u0027.  As a result, an\nunprivileged attacker could use this flaw to read private data resident\nwithin the CPU\u0027s processor store buffer. (CVE-2018-12126)\n\n* Microprocessors use a \u2018load port\u2019 subcomponent to perform load operations\nfrom memory or IO. During a load operation, the load port receives data\nfrom the memory or IO subsystem and then provides the data to the CPU\nregisters and operations in the CPU\u2019s pipelines. Stale load operations\nresults are stored in the \u0027load port\u0027 table until overwritten by newer\noperations. Certain load-port operations triggered by an attacker can be\nused to reveal data about previous stale requests leaking data back to the\nattacker via a timing side-channel. (CVE-2019-11091)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)\n1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)\n1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)\n1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-957.12.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm\nkernel-doc-3.10.0-957.12.2.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-headers-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm\nperf-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-957.12.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm\nkernel-doc-3.10.0-957.12.2.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-headers-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm\nperf-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-957.12.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm\nkernel-doc-3.10.0-957.12.2.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debug-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-devel-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-headers-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-tools-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-957.12.2.el7.ppc64.rpm\nperf-3.10.0-957.12.2.el7.ppc64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\npython-perf-3.10.0-957.12.2.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debug-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-devel-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-headers-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-tools-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-957.12.2.el7.ppc64le.rpm\nperf-3.10.0-957.12.2.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\npython-perf-3.10.0-957.12.2.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-957.12.2.el7.s390x.rpm\nkernel-debug-3.10.0-957.12.2.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.s390x.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.s390x.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-957.12.2.el7.s390x.rpm\nkernel-devel-3.10.0-957.12.2.el7.s390x.rpm\nkernel-headers-3.10.0-957.12.2.el7.s390x.rpm\nkernel-kdump-3.10.0-957.12.2.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-957.12.2.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-957.12.2.el7.s390x.rpm\nperf-3.10.0-957.12.2.el7.s390x.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.s390x.rpm\npython-perf-3.10.0-957.12.2.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-headers-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm\nperf-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-957.12.2.el7.ppc64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-957.12.2.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-957.12.2.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm\nkernel-doc-3.10.0-957.12.2.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-devel-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-headers-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm\nperf-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-12126\nhttps://access.redhat.com/security/cve/CVE-2018-12127\nhttps://access.redhat.com/security/cve/CVE-2018-12130\nhttps://access.redhat.com/security/cve/CVE-2019-11091\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/mds\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nub8jpANp7mM=\n=Ik8D\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 202003-56\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: Xen: Multiple vulnerabilities\n     Date: March 25, 2020\n     Bugs: #686024, #699048, #699996, #702644\n       ID: 202003-56\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Xen, the worst of which\ncould allow for privilege escalation. \n\nBackground\n==========\n\nXen is a bare-metal hypervisor. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  app-emulation/xen          \u003c 4.12.0-r1              \u003e= 4.12.0-r1\n  2  app-emulation/xen-tools    \u003c 4.12.0-r1              \u003e= 4.12.0-r1\n    -------------------------------------------------------------------\n     2 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Xen. Please review the\nreferenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Xen users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.12.0-r1\"\n\nReferences\n==========\n\n[  1 ] CVE-2018-12126\n       https://nvd.nist.gov/vuln/detail/CVE-2018-12126\n[  2 ] CVE-2018-12127\n       https://nvd.nist.gov/vuln/detail/CVE-2018-12127\n[  3 ] CVE-2018-12130\n       https://nvd.nist.gov/vuln/detail/CVE-2018-12130\n[  4 ] CVE-2018-12207\n       https://nvd.nist.gov/vuln/detail/CVE-2018-12207\n[  5 ] CVE-2018-12207\n       https://nvd.nist.gov/vuln/detail/CVE-2018-12207\n[  6 ] CVE-2019-11091\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11091\n[  7 ] CVE-2019-11135\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11135\n[  8 ] CVE-2019-18420\n       https://nvd.nist.gov/vuln/detail/CVE-2019-18420\n[  9 ] CVE-2019-18421\n       https://nvd.nist.gov/vuln/detail/CVE-2019-18421\n[ 10 ] CVE-2019-18423\n       https://nvd.nist.gov/vuln/detail/CVE-2019-18423\n[ 11 ] CVE-2019-18424\n       https://nvd.nist.gov/vuln/detail/CVE-2019-18424\n[ 12 ] CVE-2019-18425\n       https://nvd.nist.gov/vuln/detail/CVE-2019-18425\n[ 13 ] CVE-2019-19577\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19577\n[ 14 ] CVE-2019-19578\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19578\n[ 15 ] CVE-2019-19580\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19580\n[ 16 ] CVE-2019-19581\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19581\n[ 17 ] CVE-2019-19582\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19582\n[ 18 ] CVE-2019-19583\n       https://nvd.nist.gov/vuln/detail/CVE-2019-19583\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202003-56\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2020 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-11091"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091"
      },
      {
        "db": "PACKETSTORM",
        "id": "152917"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152932"
      },
      {
        "db": "PACKETSTORM",
        "id": "152899"
      },
      {
        "db": "PACKETSTORM",
        "id": "152889"
      },
      {
        "db": "PACKETSTORM",
        "id": "152894"
      },
      {
        "db": "PACKETSTORM",
        "id": "152884"
      },
      {
        "db": "PACKETSTORM",
        "id": "156920"
      },
      {
        "db": "PACKETSTORM",
        "id": "152876"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-11091",
        "trust": 3.5
      },
      {
        "db": "SIEMENS",
        "id": "SSA-616472",
        "trust": 1.8
      },
      {
        "db": "SIEMENS",
        "id": "SSA-608355",
        "trust": 1.8
      },
      {
        "db": "MCAFEE",
        "id": "SB10292",
        "trust": 1.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "156920",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1754",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0153",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1737.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0127",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1794",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4255",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1777",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1705",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1812",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4321",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-26696",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "155956",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "152952",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "152942",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "108330",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152917",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152911",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152904",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152932",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152899",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "153248",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152889",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152894",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152884",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "152876",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091"
      },
      {
        "db": "PACKETSTORM",
        "id": "152917"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152932"
      },
      {
        "db": "PACKETSTORM",
        "id": "152899"
      },
      {
        "db": "PACKETSTORM",
        "id": "153248"
      },
      {
        "db": "PACKETSTORM",
        "id": "152889"
      },
      {
        "db": "PACKETSTORM",
        "id": "152894"
      },
      {
        "db": "PACKETSTORM",
        "id": "152884"
      },
      {
        "db": "PACKETSTORM",
        "id": "156920"
      },
      {
        "db": "PACKETSTORM",
        "id": "152876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11091"
      }
    ]
  },
  "id": "VAR-201905-1248",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703"
      }
    ],
    "trust": 1.4380651733333334
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      }
    ]
  },
  "last_update_date": "2026-04-10T22:26:34.407000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Patches for multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22234)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/168521"
      },
      {
        "title": "Linux kernel Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92584"
      },
      {
        "title": "The Register",
        "trust": 0.2,
        "url": "https://www.theregister.co.uk/2019/05/14/intel_hyper_threading_mitigations/"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191167 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191179 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191168 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191171 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-rt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191176 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191186 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191197 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191195 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: redhat-virtualization-host security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191207 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191185 - Security Advisory"
      },
      {
        "title": "Red Hat: CVE-2019-11091",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2019-11091"
      },
      {
        "title": "Red Hat: Important: rhvm-setup-plugins security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191206 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191183 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191178 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191177 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191198 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191193 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191180 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: rhvm-appliance security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191208 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191189 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191182 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191184 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191172 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: redhat-virtualization-host security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191209 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191181 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel-rt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191174 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191155 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: vdsm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191203 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191187 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: rhvm-setup-plugins security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191205 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191169 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: vdsm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191204 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191188 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191196 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: libvirt security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191194 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Advanced Virtualization security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191455 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191202 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191200 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3983-1"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191199 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191201 - Security Advisory"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-288: x86: Inconsistent PV IOMMU discipline",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5e6e0619bc9879769e2dc27651292ba1"
      },
      {
        "title": "Debian Security Advisories: DSA-4444-1 linux -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=c960cd2c4c663bee4208c29f78956570"
      },
      {
        "title": "Ubuntu Security Notice: intel-microcode update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-3"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3983-2"
      },
      {
        "title": "Debian Security Advisories: DSA-4447-1 intel-microcode -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=783d5f8f3ad6bd4b472bac87f78daf39"
      },
      {
        "title": "Red Hat: Important: qemu-kvm-rhev security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192553 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: virt:rhel security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191175 - Security Advisory"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a3e8998cea5d5825f10ea1c09276196e"
      },
      {
        "title": "Debian CVElist Bug Report Logs: Xen Hypervisor security update for Intel MDS - XSA 297",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3c5d2f154807c8ff4e324ef14ef12771"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-292: x86: insufficient TLB flushing when using PCID",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6f420d7ce4edc488c67e4f105805e662"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-293: x86: PV kernel context switch corruption",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6489072c7d814c3eeb410e3c3014742f"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-287: x86: steal_page violates page_struct access discipline",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2265e0ec672f9854d200348511f0f8de"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-285: race with pass-through device hotplug",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=58ea80c1aac43705a15b8df06106fc72"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-284: grant table transfer issues on large hosts",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3fb9629013e9105b3361893f58ff13e2"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-291: x86/PV: page type reference counting issue with failed IOMMU update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=24d344e2b0de0f8050341e180d5e3ad6"
      },
      {
        "title": "Debian CVElist Bug Report Logs: xen: XSA-290: missing preemption in x86 PV page table unvalidation",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=eefa90208138c527071b467dedc4d2d8"
      },
      {
        "title": "Ubuntu Security Notice: intel-microcode update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-1"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3984-1"
      },
      {
        "title": "Ubuntu Security Notice: libvirt update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3985-2"
      },
      {
        "title": "Ubuntu Security Notice: libvirt update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3985-1"
      },
      {
        "title": "Ubuntu Security Notice: intel-microcode update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-2"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3982-1"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2019-1205",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1205"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2019-1260",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1260"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2019-1205",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1205"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191170 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux-hwe, linux-azure vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3980-2"
      },
      {
        "title": "Debian CVElist Bug Report Logs: qemu: CVE-2019-5008",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3a83f6ae99e6b2e0c974ac32c9ef74a2"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-xenial vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3982-2"
      },
      {
        "title": "Red Hat: Important: kernel-rt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191190 - Security Advisory"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=30d0a4e627570cd4d5945ca971daba72"
      },
      {
        "title": "IBM: IBM Security Bulletin: Vulnerabilities in Intel CPUs affect IBM Integrated Analytics System",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=c47b16f3ebd0fdbec9f73e7f3324fed3"
      },
      {
        "title": "IBM: IBM Security Bulletin: IBM has released Unified Extensible Firmware Interface (UEFI) fixes in response to Intel Microarchitectural Data Sampling (MDS) Side Channel vulnerabilities.",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=bc9f36e4b0d29a9ca06baf362fd957d0"
      },
      {
        "title": "Debian Security Advisories: DSA-4564-1 linux -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=6a2efed9e3fbb73861bbf72b19140077"
      },
      {
        "title": "Ubuntu Security Notice: qemu update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3978-1"
      },
      {
        "title": "Debian Security Advisories: DSA-4469-1 libvirt -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=4e2fe5b482468cc28e671437a04edddc"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3981-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3981-2"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3980-1"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3979-1"
      },
      {
        "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03618 rev. 8  -  Intel Microarchitectural Data Sampling Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=444f553b1dc021fded282dc383d1dee5"
      },
      {
        "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03618 rev. 8  -  Intel Microarchitectural Data Sampling Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=963334ba825bca145661b448af1a068f"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2019",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=767e8ff3a913d6c9b177c63c24420933"
      },
      {
        "title": "Presentations",
        "trust": 0.1,
        "url": "https://github.com/hwroot/Presentations "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/j1nh0/pdf "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/j1nh0/nisol "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/kali973/spectre-meltdown-checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/es0j/hyperbleed "
      },
      {
        "title": "puppet-meltdown",
        "trust": 0.1,
        "url": "https://github.com/timidri/puppet-meltdown "
      },
      {
        "title": "Linux-Tools",
        "trust": 0.1,
        "url": "https://github.com/minutesinch/Linux-Tools "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/merlinepedra25/spectre-meltdown-checker "
      },
      {
        "title": "spectre-meltdown",
        "trust": 0.1,
        "url": "https://github.com/edsonjt81/spectre-meltdown "
      },
      {
        "title": "spectre-meltdown-checker",
        "trust": 0.1,
        "url": "https://github.com/speed47/spectre-meltdown-checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/merlinepedra/spectre-meltdown-checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/kin-cho/my-spectre-meltdown-checker "
      },
      {
        "title": "Firmware-Security",
        "trust": 0.1,
        "url": "https://github.com/virusbeeE/Firmware-Security "
      },
      {
        "title": "Hardware-and-Firmware-Security-Guidance",
        "trust": 0.1,
        "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance "
      },
      {
        "title": "hardware-attacks-state-of-the-art",
        "trust": 0.1,
        "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art "
      },
      {
        "title": "ansible-everyday",
        "trust": 0.1,
        "url": "https://github.com/kaosagnt/ansible-everyday "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/intel-zombieload-side-channel-attack-10-takeaways/144771/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/apple-patches-intel-side-channel-ios-macos/144743/"
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/intel-cpus-impacted-by-new-class-of-spectre-like-attacks/144728/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-200",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142703"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11091"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.4,
        "url": "https://www.debian.org/security/2020/dsa-4602"
      },
      {
        "trust": 1.9,
        "url": "https://security.gentoo.org/glsa/202003-56"
      },
      {
        "trust": 1.9,
        "url": "https://access.redhat.com/errata/rhsa-2019:1455"
      },
      {
        "trust": 1.8,
        "url": "https://seclists.org/bugtraq/2019/jun/28"
      },
      {
        "trust": 1.8,
        "url": "https://seclists.org/bugtraq/2019/jun/36"
      },
      {
        "trust": 1.8,
        "url": "https://seclists.org/bugtraq/2019/nov/15"
      },
      {
        "trust": 1.8,
        "url": "https://seclists.org/bugtraq/2020/jan/21"
      },
      {
        "trust": 1.8,
        "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt"
      },
      {
        "trust": 1.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.synology.com/security/advisory/synology_sa_19_24"
      },
      {
        "trust": 1.8,
        "url": "https://www.freebsd.org/security/advisories/freebsd-sa-19:07.mds.asc"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2019:2553"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/3977-3/"
      },
      {
        "trust": 1.7,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10292"
      },
      {
        "trust": 1.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11091"
      },
      {
        "trust": 1.5,
        "url": "https://access.redhat.com/security/cve/cve-2019-11091"
      },
      {
        "trust": 1.5,
        "url": "https://access.redhat.com/security/cve/cve-2018-12127"
      },
      {
        "trust": 1.5,
        "url": "https://access.redhat.com/security/cve/cve-2018-12130"
      },
      {
        "trust": 1.5,
        "url": "https://access.redhat.com/security/cve/cve-2018-12126"
      },
      {
        "trust": 1.2,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12126"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12127"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12130"
      },
      {
        "trust": 0.9,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/vulnerabilities/mds"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/"
      },
      {
        "trust": 0.6,
        "url": "https://usn.ubuntu.com/3977-1/"
      },
      {
        "trust": 0.6,
        "url": "http://xenbits.xen.org/xsa/advisory-297.html"
      },
      {
        "trust": 0.6,
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013"
      },
      {
        "trust": 0.6,
        "url": "https://www.vmware.com/security/advisories/vmsa-2019-0008.html"
      },
      {
        "trust": 0.6,
        "url": "https://aws.amazon.com/security/security-bulletins/aws-2019-004/"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781"
      },
      {
        "trust": 0.6,
        "url": "http://www.intel.com/content/www/us/en/homepage.html"
      },
      {
        "trust": 0.6,
        "url": "https://securityadvisories.paloaltonetworks.com/home/detail/150"
      },
      {
        "trust": 0.6,
        "url": "https://support.citrix.com/article/ctx251995"
      },
      {
        "trust": 0.6,
        "url": "https://www.chromium.org/chromium-os/mds-on-chromeos"
      },
      {
        "trust": 0.6,
        "url": "https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-chrome-os-m75.html"
      },
      {
        "trust": 0.6,
        "url": "https://security.freebsd.org/advisories/freebsd-sa-19:07.mds.asc"
      },
      {
        "trust": 0.6,
        "url": "https://usn.ubuntu.com/3985-1/"
      },
      {
        "trust": 0.6,
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914052-1.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.debian.org/security/2019/dsa-4444"
      },
      {
        "trust": 0.6,
        "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00018.html"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/en-us/ht210119"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/156920/gentoo-linux-security-advisory-202003-56.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/80874"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/1118439"
      },
      {
        "trust": 0.6,
        "url": "https://www.securityfocus.com/bid/108330"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0127/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4255/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4321/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/81098"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/81030"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-26696"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0153/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/152952/ubuntu-security-notice-usn-3985-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/1107009"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/155956/debian-security-advisory-4602-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1812/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/81194"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.1794/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/152942/debian-security-advisory-4447-1.html"
      },
      {
        "trust": 0.1,
        "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10292"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=60203"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/3983-1/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/2974891"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1208"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1187"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1197"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9503"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3882"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3980-1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9500"
      },
      {
        "trust": 0.1,
        "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/mds"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16884"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3874"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-20.21~18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3887"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/usn/usn-3980-2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1018.18~18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1200"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10132"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-10132"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1182"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1196"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1168"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12207"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18424"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19583"
      },
      {
        "trust": 0.1,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18423"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19581"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18420"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19580"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19582"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18421"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19577"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18425"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11135"
      },
      {
        "trust": 0.1,
        "url": "https://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19578"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2019:1174"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091"
      },
      {
        "db": "PACKETSTORM",
        "id": "152917"
      },
      {
        "db": "PACKETSTORM",
        "id": "152911"
      },
      {
        "db": "PACKETSTORM",
        "id": "152904"
      },
      {
        "db": "PACKETSTORM",
        "id": "152932"
      },
      {
        "db": "PACKETSTORM",
        "id": "152899"
      },
      {
        "db": "PACKETSTORM",
        "id": "153248"
      },
      {
        "db": "PACKETSTORM",
        "id": "152889"
      },
      {
        "db": "PACKETSTORM",
        "id": "152894"
      },
      {
        "db": "PACKETSTORM",
        "id": "152884"
      },
      {
        "db": "PACKETSTORM",
        "id": "156920"
      },
      {
        "db": "PACKETSTORM",
        "id": "152876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11091"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-142703",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11091",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152917",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152911",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152904",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152932",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152899",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "153248",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152889",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152894",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152884",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "156920",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "152876",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11091",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-07-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-22234",
        "ident": null
      },
      {
        "date": "2019-05-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142703",
        "ident": null
      },
      {
        "date": "2019-05-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-11091",
        "ident": null
      },
      {
        "date": "2019-05-15T15:32:28",
        "db": "PACKETSTORM",
        "id": "152917",
        "ident": null
      },
      {
        "date": "2019-05-15T15:29:05",
        "db": "PACKETSTORM",
        "id": "152911",
        "ident": null
      },
      {
        "date": "2019-05-15T15:23:42",
        "db": "PACKETSTORM",
        "id": "152904",
        "ident": null
      },
      {
        "date": "2019-05-15T15:45:46",
        "db": "PACKETSTORM",
        "id": "152932",
        "ident": null
      },
      {
        "date": "2019-05-15T15:22:20",
        "db": "PACKETSTORM",
        "id": "152899",
        "ident": null
      },
      {
        "date": "2019-06-11T14:57:40",
        "db": "PACKETSTORM",
        "id": "153248",
        "ident": null
      },
      {
        "date": "2019-05-15T15:19:28",
        "db": "PACKETSTORM",
        "id": "152889",
        "ident": null
      },
      {
        "date": "2019-05-15T15:20:58",
        "db": "PACKETSTORM",
        "id": "152894",
        "ident": null
      },
      {
        "date": "2019-05-15T15:07:16",
        "db": "PACKETSTORM",
        "id": "152884",
        "ident": null
      },
      {
        "date": "2020-03-26T14:46:06",
        "db": "PACKETSTORM",
        "id": "156920",
        "ident": null
      },
      {
        "date": "2019-05-15T14:57:41",
        "db": "PACKETSTORM",
        "id": "152876",
        "ident": null
      },
      {
        "date": "2019-05-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-624",
        "ident": null
      },
      {
        "date": "2019-05-30T16:29:01.417000",
        "db": "NVD",
        "id": "CVE-2019-11091",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-07-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-22234",
        "ident": null
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142703",
        "ident": null
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-11091",
        "ident": null
      },
      {
        "date": "2021-10-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-624",
        "ident": null
      },
      {
        "date": "2024-11-21T04:20:31.233000",
        "db": "NVD",
        "id": "CVE-2019-11091",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "152932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "_id": null,
    "data": "Multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22234)",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-22234"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "_id": null,
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-624"
      }
    ],
    "trust": 0.6
  }
}

VAR-202106-0343

Vulnerability from variot - Updated: 2026-04-10 22:00

Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel Processors (Intel processors) are Intel Corporation's processors that interpret computer instructions and process data in computer software. An authenticated attacker could exploit this vulnerability to obtain sensitive information. 6 ELS) - i386, x86_64

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:2303-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2303 Issue date: 2021-06-08 CVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 ==================================================================== 1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.6) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: vt-d related privilege escalation (CVE-2020-24489)

  • hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)

  • hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)

  • hw: information disclosure on some Intel Atom processors (CVE-2020-24513)

Bug Fix(es) and Enhancement(s):

  • Update Intel CPU microcode to microcode-20210525 release

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.6):

Source: microcode_ctl-2.1-47.21.el7_6.src.rpm

x86_64: microcode_ctl-2.1-47.21.el7_6.x86_64.rpm microcode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.6):

Source: microcode_ctl-2.1-47.21.el7_6.src.rpm

x86_64: microcode_ctl-2.1-47.21.el7_6.x86_64.rpm microcode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.6):

Source: microcode_ctl-2.1-47.21.el7_6.src.rpm

x86_64: microcode_ctl-2.1-47.21.el7_6.x86_64.rpm microcode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/cve/CVE-2020-24513 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYMAkptzjgjWX9erEAQjQaxAAiXuFV2AZ5UNVNR29EFFEaHsHDTLaeYNm ibgw81yBpSZopPqtVYoznk9JAYc2YSrgbq0/BxC+rWHRTGPom5lZumlkqc+Nkjon sGx6SXU5q9M/nPutM/p5afTXNaHbZVQojjeP9VIpF1qz94JRcJisrumAW/sS27/v Ie6wqizvXNJZq30FOmgAq3vSXJpvakZYrBZoRvdm3MUx3rqiy/Sn62VtexeJoWJf 7BVF9y24rn2r9BuG6QNKGnYTxuUHAfcTAy5laJZ7EWdpEXcSZG6SV6x40Zdg6TaV 8x6PFSbvb2woGvWfFr5so9I92X1z9MCh4vQ5hmPnoHHREXpDKcDjvmfnStNkKD3F kOvf99Ph7E4Th/NhFwAczspiZEJYbvZ7ZenKQwWd2lGnEzFdPU5g5c3n+WVyN1qZ psD/uZlryQyIUyvRPowGppm/vJfyIiDKr+yUpq3AGscs9ASpnH6120ClaQx3KutT gpUbnKDxAW7UMlg5V4A9y5jJBgW8cZGH4qKc9KeDOj1MOjOhrfClInKhfqqY6YF1 8ulHpTKFyXzFjKBST1PKhCQQ2HhG74GoG147R0yHZw+9T0+o3ovlEQTxD2yVgGua 7LQ/vJotdgvBEaYoWTz6WwphiYQpFbbyQ6E0qplPVJMMmFKhDpNKS+ama5CHnfUF 6I3FlLzt1EU=YG8p -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "_id": null,
        "model": "solidfire bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "_id": null,
        "model": "hci compute node bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "_id": null,
        "model": "microcode",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "20210608"
      },
      {
        "_id": null,
        "model": "fas\\/aff bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24511"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163956"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163031"
      },
      {
        "db": "PACKETSTORM",
        "id": "163036"
      },
      {
        "db": "PACKETSTORM",
        "id": "163040"
      },
      {
        "db": "PACKETSTORM",
        "id": "163044"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2020-24511",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-24511",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-178397",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.0,
            "id": "CVE-2020-24511",
            "impactScore": 4.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-24511",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-178397",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178397"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24511"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel Processors (Intel processors) are Intel Corporation\u0027s processors that interpret computer instructions and process data in computer software. An authenticated attacker could exploit this vulnerability to obtain sensitive information. 6 ELS) - i386, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2021:2303-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:2303\nIssue date:        2021-06-08\nCVE Names:         CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n                   CVE-2020-24513\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.6) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20210525 release\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.6):\n\nSource:\nmicrocode_ctl-2.1-47.21.el7_6.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-47.21.el7_6.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.6):\n\nSource:\nmicrocode_ctl-2.1-47.21.el7_6.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-47.21.el7_6.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.6):\n\nSource:\nmicrocode_ctl-2.1-47.21.el7_6.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-47.21.el7_6.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/cve/CVE-2020-24513\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n6I3FlLzt1EU=YG8p\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24511"
      },
      {
        "db": "VULHUB",
        "id": "VHN-178397"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163956"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163031"
      },
      {
        "db": "PACKETSTORM",
        "id": "163036"
      },
      {
        "db": "PACKETSTORM",
        "id": "163040"
      },
      {
        "db": "PACKETSTORM",
        "id": "163044"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-24511",
        "trust": 2.0
      },
      {
        "db": "SIEMENS",
        "id": "SSA-309571",
        "trust": 1.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163047",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163044",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163040",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163031",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163036",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163037",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163042",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163043",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163048",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163032",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163046",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-178397",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163954",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163956",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163757",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163863",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178397"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163956"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163031"
      },
      {
        "db": "PACKETSTORM",
        "id": "163036"
      },
      {
        "db": "PACKETSTORM",
        "id": "163040"
      },
      {
        "db": "PACKETSTORM",
        "id": "163044"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24511"
      }
    ]
  },
  "id": "VAR-202106-0343",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178397"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2026-04-10T22:00:19.849000Z",
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-668",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178397"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24511"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 1.1,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
      },
      {
        "trust": 1.1,
        "url": "https://www.debian.org/security/2021/dsa-4934"
      },
      {
        "trust": 1.1,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
      },
      {
        "trust": 1.1,
        "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2020-24511"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2020-24512"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2020-24489"
      },
      {
        "trust": 0.9,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511"
      },
      {
        "trust": 0.9,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2020-24513"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24513"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-8698"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0543"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-8695"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0549"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-8696"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0548"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3323"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3322"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3027"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2299"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2300"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2307"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2304"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2303"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3176"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178397"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163956"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163031"
      },
      {
        "db": "PACKETSTORM",
        "id": "163036"
      },
      {
        "db": "PACKETSTORM",
        "id": "163040"
      },
      {
        "db": "PACKETSTORM",
        "id": "163044"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24511"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-178397",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163954",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163956",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163757",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163031",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163036",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163040",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163044",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163047",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "163863",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24511",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178397",
        "ident": null
      },
      {
        "date": "2021-08-31T15:43:48",
        "db": "PACKETSTORM",
        "id": "163954",
        "ident": null
      },
      {
        "date": "2021-08-31T15:44:21",
        "db": "PACKETSTORM",
        "id": "163956",
        "ident": null
      },
      {
        "date": "2021-08-09T14:15:37",
        "db": "PACKETSTORM",
        "id": "163757",
        "ident": null
      },
      {
        "date": "2021-06-09T13:26:32",
        "db": "PACKETSTORM",
        "id": "163031",
        "ident": null
      },
      {
        "date": "2021-06-09T13:28:02",
        "db": "PACKETSTORM",
        "id": "163036",
        "ident": null
      },
      {
        "date": "2021-06-09T13:40:18",
        "db": "PACKETSTORM",
        "id": "163040",
        "ident": null
      },
      {
        "date": "2021-06-09T13:40:48",
        "db": "PACKETSTORM",
        "id": "163044",
        "ident": null
      },
      {
        "date": "2021-06-09T13:42:12",
        "db": "PACKETSTORM",
        "id": "163047",
        "ident": null
      },
      {
        "date": "2021-08-17T15:19:34",
        "db": "PACKETSTORM",
        "id": "163863",
        "ident": null
      },
      {
        "date": "2021-06-09T19:15:08.897000",
        "db": "NVD",
        "id": "CVE-2020-24511",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-09-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178397",
        "ident": null
      },
      {
        "date": "2021-09-09T12:55:19.680000",
        "db": "NVD",
        "id": "CVE-2020-24511",
        "ident": null
      }
    ]
  },
  "title": {
    "_id": null,
    "data": "Red Hat Security Advisory 2021-3323-01",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "163954"
      }
    ],
    "trust": 0.1
  }
}

VAR-202106-0344

Vulnerability from variot - Updated: 2026-03-09 20:52

Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:2303-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2303 Issue date: 2021-06-08 CVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 ==================================================================== 1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.6) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: vt-d related privilege escalation (CVE-2020-24489)

  • hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)

  • hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)

  • hw: information disclosure on some Intel Atom processors (CVE-2020-24513)

Bug Fix(es) and Enhancement(s):

  • Update Intel CPU microcode to microcode-20210525 release

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.6):

Source: microcode_ctl-2.1-47.21.el7_6.src.rpm

x86_64: microcode_ctl-2.1-47.21.el7_6.x86_64.rpm microcode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.6):

Source: microcode_ctl-2.1-47.21.el7_6.src.rpm

x86_64: microcode_ctl-2.1-47.21.el7_6.x86_64.rpm microcode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.6):

Source: microcode_ctl-2.1-47.21.el7_6.src.rpm

x86_64: microcode_ctl-2.1-47.21.el7_6.x86_64.rpm microcode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/cve/CVE-2020-24513 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYMAkptzjgjWX9erEAQjQaxAAiXuFV2AZ5UNVNR29EFFEaHsHDTLaeYNm ibgw81yBpSZopPqtVYoznk9JAYc2YSrgbq0/BxC+rWHRTGPom5lZumlkqc+Nkjon sGx6SXU5q9M/nPutM/p5afTXNaHbZVQojjeP9VIpF1qz94JRcJisrumAW/sS27/v Ie6wqizvXNJZq30FOmgAq3vSXJpvakZYrBZoRvdm3MUx3rqiy/Sn62VtexeJoWJf 7BVF9y24rn2r9BuG6QNKGnYTxuUHAfcTAy5laJZ7EWdpEXcSZG6SV6x40Zdg6TaV 8x6PFSbvb2woGvWfFr5so9I92X1z9MCh4vQ5hmPnoHHREXpDKcDjvmfnStNkKD3F kOvf99Ph7E4Th/NhFwAczspiZEJYbvZ7ZenKQwWd2lGnEzFdPU5g5c3n+WVyN1qZ psD/uZlryQyIUyvRPowGppm/vJfyIiDKr+yUpq3AGscs9ASpnH6120ClaQx3KutT gpUbnKDxAW7UMlg5V4A9y5jJBgW8cZGH4qKc9KeDOj1MOjOhrfClInKhfqqY6YF1 8ulHpTKFyXzFjKBST1PKhCQQ2HhG74GoG147R0yHZw+9T0+o3ovlEQTxD2yVgGua 7LQ/vJotdgvBEaYoWTz6WwphiYQpFbbyQ6E0qplPVJMMmFKhDpNKS+ama5CHnfUF 6I3FlLzt1EU=YG8p -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================= Ubuntu Security Notice USN-4985-1 June 09, 2021

intel-microcode vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 21.04
  • Ubuntu 20.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Intel Microcode. This may allow a local user to perform a privilege escalation attack. (CVE-2021-24489)

Joseph Nuzman discovered that some Intel processors may not properly apply EIBRS mitigations (originally developed for CVE-2017-5715) and hence may allow unauthorized memory reads via sidechannel attacks. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2020-24511)

Travis Downs discovered that some Intel processors did not properly flush cache-lines for trivial-data values. This may allow an unauthorized user to infer the presence of these trivial-data-cache-lines via timing sidechannel attacks. A local attacker could use this to expose sensitive information. (CVE-2020-24512)

It was discovered that certain Intel Atom processors could expose memory contents stored in microarchitectural buffers. A local attacker could use this to expose sensitive information. (CVE-2020-24513)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 21.04: intel-microcode 3.20210608.0ubuntu0.21.04.1

Ubuntu 20.10: intel-microcode 3.20210608.0ubuntu0.20.10.1

Ubuntu 20.04 LTS: intel-microcode 3.20210608.0ubuntu0.20.04.1

Ubuntu 18.04 LTS: intel-microcode 3.20210608.0ubuntu0.18.04.1

Ubuntu 16.04 ESM: intel-microcode 3.20210608.0ubuntu0.16.04.1+esm1

Ubuntu 14.04 ESM: intel-microcode 3.20210608.0ubuntu0.14.04.1+esm1

After a standard system update you need to reboot your computer to make all the necessary changes

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0344",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "solidfire bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "hci compute node bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "microcode",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "20210608"
      },
      {
        "model": "fas\\/aff bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163032"
      },
      {
        "db": "PACKETSTORM",
        "id": "163037"
      },
      {
        "db": "PACKETSTORM",
        "id": "163042"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2020-24512",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-24512",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-178398",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-24512",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-24512",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-178398",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2021:2303-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:2303\nIssue date:        2021-06-08\nCVE Names:         CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n                   CVE-2020-24513\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.6) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20210525 release\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.6):\n\nSource:\nmicrocode_ctl-2.1-47.21.el7_6.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-47.21.el7_6.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.6):\n\nSource:\nmicrocode_ctl-2.1-47.21.el7_6.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-47.21.el7_6.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.6):\n\nSource:\nmicrocode_ctl-2.1-47.21.el7_6.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-47.21.el7_6.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-47.21.el7_6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/cve/CVE-2020-24513\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n6I3FlLzt1EU=YG8p\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. =========================================================================\nUbuntu Security Notice USN-4985-1\nJune 09, 2021\n\nintel-microcode vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 ESM\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in Intel Microcode. This may allow a local user to perform a privilege escalation\nattack. (CVE-2021-24489)\n\nJoseph Nuzman discovered that some Intel processors may not properly apply\nEIBRS mitigations (originally developed for CVE-2017-5715) and hence may\nallow unauthorized memory reads via sidechannel attacks. A local attacker\ncould use this to expose sensitive information, including kernel\nmemory. (CVE-2020-24511)\n\nTravis Downs discovered that some Intel processors did not properly flush\ncache-lines for trivial-data values. This may allow an unauthorized user to\ninfer the presence of these trivial-data-cache-lines via timing sidechannel\nattacks. A local attacker could use this to expose sensitive\ninformation. (CVE-2020-24512)\n\nIt was discovered that certain Intel Atom processors could expose memory\ncontents stored in microarchitectural buffers. A local attacker could use\nthis to expose sensitive information. (CVE-2020-24513)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n  intel-microcode                 3.20210608.0ubuntu0.21.04.1\n\nUbuntu 20.10:\n  intel-microcode                 3.20210608.0ubuntu0.20.10.1\n\nUbuntu 20.04 LTS:\n  intel-microcode                 3.20210608.0ubuntu0.20.04.1\n\nUbuntu 18.04 LTS:\n  intel-microcode                 3.20210608.0ubuntu0.18.04.1\n\nUbuntu 16.04 ESM:\n  intel-microcode                 3.20210608.0ubuntu0.16.04.1+esm1\n\nUbuntu 14.04 ESM:\n  intel-microcode                 3.20210608.0ubuntu0.14.04.1+esm1\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      },
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163032"
      },
      {
        "db": "PACKETSTORM",
        "id": "163037"
      },
      {
        "db": "PACKETSTORM",
        "id": "163042"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163048"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-24512",
        "trust": 2.0
      },
      {
        "db": "SIEMENS",
        "id": "SSA-309571",
        "trust": 1.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163037",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163047",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163042",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163048",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163032",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163044",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163040",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163043",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163031",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163036",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163046",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-178398",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163924",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163954",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163757",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163863",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163032"
      },
      {
        "db": "PACKETSTORM",
        "id": "163037"
      },
      {
        "db": "PACKETSTORM",
        "id": "163042"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163048"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "id": "VAR-202106-0344",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2026-03-09T20:52:52.944000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-203",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.1,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
      },
      {
        "trust": 1.1,
        "url": "https://www.debian.org/security/2021/dsa-4934"
      },
      {
        "trust": 1.1,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
      },
      {
        "trust": 1.1,
        "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2020-24511"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2020-24512"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2020-24489"
      },
      {
        "trust": 0.8,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24513"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-8698"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0543"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-8695"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0549"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-8696"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0548"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-24513"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3255"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3323"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3027"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2302"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2306"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2308"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2303"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-24489"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.20.10.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.21.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.20.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-4985-1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3176"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163032"
      },
      {
        "db": "PACKETSTORM",
        "id": "163037"
      },
      {
        "db": "PACKETSTORM",
        "id": "163042"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163048"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "db": "PACKETSTORM",
        "id": "163032"
      },
      {
        "db": "PACKETSTORM",
        "id": "163037"
      },
      {
        "db": "PACKETSTORM",
        "id": "163042"
      },
      {
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "db": "PACKETSTORM",
        "id": "163048"
      },
      {
        "db": "PACKETSTORM",
        "id": "163863"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "date": "2021-08-27T19:22:22",
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "date": "2021-08-31T15:43:48",
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "date": "2021-08-09T14:15:37",
        "db": "PACKETSTORM",
        "id": "163757"
      },
      {
        "date": "2021-06-09T13:26:50",
        "db": "PACKETSTORM",
        "id": "163032"
      },
      {
        "date": "2021-06-09T13:28:17",
        "db": "PACKETSTORM",
        "id": "163037"
      },
      {
        "date": "2021-06-09T13:40:32",
        "db": "PACKETSTORM",
        "id": "163042"
      },
      {
        "date": "2021-06-09T13:42:12",
        "db": "PACKETSTORM",
        "id": "163047"
      },
      {
        "date": "2021-06-09T13:42:19",
        "db": "PACKETSTORM",
        "id": "163048"
      },
      {
        "date": "2021-08-17T15:19:34",
        "db": "PACKETSTORM",
        "id": "163863"
      },
      {
        "date": "2021-06-09T19:15:08.930000",
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-09-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-178398"
      },
      {
        "date": "2021-09-09T12:56:22.933000",
        "db": "NVD",
        "id": "CVE-2020-24512"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "163048"
      }
    ],
    "trust": 0.1
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat Security Advisory 2021-3255-02",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "163924"
      }
    ],
    "trust": 0.1
  }
}

VAR-202011-1361

Vulnerability from variot - Updated: 2023-11-07 21:08

Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:5183-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:5183 Issue date: 2020-11-23 CVE Names: CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 =====================================================================

  1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.3) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.3) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)

  • hw: Vector Register Leakage-Active (CVE-2020-8696)

  • hw: Fast forward store predictor (CVE-2020-8698)

Bug Fix(es) and Enhancement(s):

  • Update Intel CPU microcode to microcode-20201112 release, addresses:
  • Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;
  • Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
  • Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;
  • Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;
  • Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;
  • Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;
  • Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision 0xe0;
  • Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;
  • Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up to 0x2006a08;
  • Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;
  • Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
  • Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
  • Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up to 0xe0;
  • Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up to 0xde;
  • Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xd6 up to 0xde;
  • Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up to 0xde;
  • Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode from revision 0x43 up to 0x44;
  • Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157 up to 0x1000159;
  • Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01 up to 0x4003003;
  • Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5002f01 up to 0x5003003;
  • Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up to 0x40;
  • Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up to 0x1e;
  • Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up to 0x34;
  • Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up to 0x18;
  • Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78 up to 0xa0;
  • Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca up to 0xe0.

  • Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.

  • Add README file to the documentation directory.

  • Add publicly-sourced codenames list to supply to gen_provides.sh; update the latter to handle the somewhat different format.

  • Add SUMMARY.intel-ucode file

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBX7v1LtzjgjWX9erEAQhhzBAAi0jG7U8W+Dm2A/Nq40aoLyRcGknttkV1 0wwy62OR4KUnqiP0gHB8Sjh6UpAPqhLNExc2+B8RyUB23yUe8/PRB1fUqpmf5150 mzwiORZfu572ao7GLskdc4SUydVSqY9QuTK7mTm+HGmOm2XQpics51xWjyfKM/TN 5lrrd3DXxTrXwsjva2tPJcCp9A1s3XAVjK16Fu+FcKvXsgxruUy41YxJMsY8Mxfj pPRzcXdMvPQYhvyv8y1KY2Mz5WMKdpOK83X6Y9iYL6d0g2UT1d3cw8AOHc6GYNFS MhLDUASoII2A4xWkXCOyaocrg58QFctEHGfnxwTU5ZGq/vfOduUSLE881thD+tqD qgQBaz0cp0tNr+nYXvhtyX9XE4ve/lszq5BxqnNF0xi9hP8T5DwZzXnhtZ+aZML2 3WlT3tqgkDE7hZqyqSG8Vd9ZLzVkjmnw7+tqRjIGvzN9eKQxLXg/fPkKeHGh+HOz y0zCBHlZKrKtz0lQHP48W9t6l0Rkh19hW1fIA46rW4C7erDcW78nBMJ2cTAxbBk1 ITTGOIHpUgn3882xKM/yAHUMK25Xkh2va/e8UpafYEazSM4H9T15N87UyCVneKdD s2N1tYHegx85eoOlt24Bw2RBPFHhFGWOtE0McQ09kyDKFyGJXUMqzPhBUvvJz8mE G3KPuKrDU0U= =Vap7 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4628-2 November 12, 2020

intel-microcode regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM

Summary:

USN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately, that update prevented certain processors in the Intel Tiger Lake family from booting successfully. This update reverts the microcode update for the Tiger Lake processor family.

Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery.

We apologize for the inconvenience.

Original advisory details:

Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) feature of some Intel processors allowed a side- channel attack based on power consumption measurements. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8695)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8696)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly isolate shared resources in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8698)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.10: intel-microcode 3.20201110.0ubuntu0.20.10.2

Ubuntu 20.04 LTS: intel-microcode 3.20201110.0ubuntu0.20.04.2

Ubuntu 18.04 LTS: intel-microcode 3.20201110.0ubuntu0.18.04.2

Ubuntu 16.04 LTS: intel-microcode 3.20201110.0ubuntu0.16.04.2

Ubuntu 14.04 ESM: intel-microcode 3.20201110.0ubuntu0.14.04.2

After a standard system update you need to reboot your computer to make all the necessary changes

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1361",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "simatic ipc477e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "21.01.15"
      },
      {
        "model": "simatic field pg m6",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "*"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "hci storage node bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "clustered data ontap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "simatic ipc647e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "25.02.08"
      },
      {
        "model": "simatic itp1000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "23.01.08"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "31"
      },
      {
        "model": "simatic field pg m5",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "22.01.08"
      },
      {
        "model": "hci compute node bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "simatic ipc847e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "25.02.08"
      },
      {
        "model": "simatic ipc477e pro",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "21.01.15"
      },
      {
        "model": "simatic ipc677e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "25.02.08"
      },
      {
        "model": "simatic ipc427e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "21.01.15"
      },
      {
        "model": "solidfire bios",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "simatic ipc627e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "25.02.08"
      },
      {
        "model": "microcode",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hci compute node bios",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": "solidfire bios",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "clustered data ontap",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "microcode",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "hci storage node bios",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              },
              {
                "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.01.08",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "22.01.08",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "21.01.15",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "21.01.15",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "21.01.15",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "21.01.15",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "21.01.15",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "21.01.15",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "25.02.08",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "25.02.08",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "25.02.08",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "25.02.08",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "25.02.08",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "25.02.08",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "25.02.08",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "25.02.08",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "23.01.08",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "23.01.08",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "db": "PACKETSTORM",
        "id": "160035"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2020-8698",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-8698",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.9,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-8698",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-8698",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-8698",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201911-1657",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-8698",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2020:5183-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2020:5183\nIssue date:        2020-11-23\nCVE Names:         CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 \n=====================================================================\n\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7.3 Advanced Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.3) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20201112 release, addresses:\n  - Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;\n  - Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;\n  - Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;\n  - Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;\n  - Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;\n  - Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;\n  - Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision\n    0xe0;\n  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in\n    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;\n  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in\n    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up\n    to 0x2006a08;\n  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in\n    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;\n  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up\n    to 0xe0;\n  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)\n    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from\n    revision 0xd6 up to 0xde;\n  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode\n    from revision 0x43 up to 0x44;\n  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157\n    up to 0x1000159;\n  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01\n    up to 0x4003003;\n  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision\n    0x5002f01 up to 0x5003003;\n  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up\n    to 0x40;\n  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up\n    to 0x1e;\n  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up\n    to 0x34;\n  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up\n    to 0x18;\n  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78\n    up to 0xa0;\n  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca\n    up to 0xe0. \n\n* Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default. \n\n* Add README file to the documentation directory. \n\n* Add publicly-sourced codenames list to supply to gen_provides.sh; update\n  the latter to handle the somewhat different format. \n\n* Add SUMMARY.intel-ucode file\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nG3KPuKrDU0U=\n=Vap7\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nUbuntu Security Notice USN-4628-2\nNovember 12, 2020\n\nintel-microcode regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nUSN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately,\nthat update prevented certain processors in the Intel Tiger Lake family\nfrom booting successfully. This update reverts the microcode update for\nthe Tiger Lake processor family. \n\nPlease note that the \u0027dis_ucode_ldr\u0027 kernel command line option can be\nadded in the boot menu to disable microcode loading for system recovery. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine\n Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running\n Average Power Limit (RAPL) feature of some Intel processors allowed a side-\n channel attack based on power consumption measurements. A local attacker\n could possibly use this to expose sensitive information. (CVE-2020-8695)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly remove sensitive information\n before storage or transfer in some situations. A local attacker could\n possibly use this to expose sensitive information. (CVE-2020-8696)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly isolate shared resources in some\n situations. A local attacker could possibly use this to expose sensitive\n information. (CVE-2020-8698)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.10:\n  intel-microcode                 3.20201110.0ubuntu0.20.10.2\n\nUbuntu 20.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.20.04.2\n\nUbuntu 18.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.18.04.2\n\nUbuntu 16.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.16.04.2\n\nUbuntu 14.04 ESM:\n  intel-microcode                 3.20201110.0ubuntu0.14.04.2\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163758"
      },
      {
        "db": "PACKETSTORM",
        "id": "163772"
      },
      {
        "db": "PACKETSTORM",
        "id": "160191"
      },
      {
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "db": "PACKETSTORM",
        "id": "160188"
      },
      {
        "db": "PACKETSTORM",
        "id": "160035"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-8698",
        "trust": 3.3
      },
      {
        "db": "SIEMENS",
        "id": "SSA-678983",
        "trust": 1.7
      },
      {
        "db": "JVN",
        "id": "JVNVU91051134",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-22-132-05",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163772",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "160018",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "160035",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163993",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163863",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "162588",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "160187",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163757",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "160407",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2604",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2905",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4124",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4327",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2797",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0423",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2721",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4017",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.2355",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4200",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1664",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2945",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3959",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4153",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4033",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2672",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021083127",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021081125",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021080915",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021081834",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-49266",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8698",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163924",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163954",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163758",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "160191",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "160188",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163758"
      },
      {
        "db": "PACKETSTORM",
        "id": "163772"
      },
      {
        "db": "PACKETSTORM",
        "id": "160191"
      },
      {
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "db": "PACKETSTORM",
        "id": "160188"
      },
      {
        "db": "PACKETSTORM",
        "id": "160035"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "id": "VAR-202011-1361",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.5185185333333333
  },
  "last_update_date": "2023-11-07T21:08:28.118000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "NTAP-20201113-0006 Intel Intel\u00a0Product\u00a0Security\u00a0Center",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
      },
      {
        "title": "Intel Processors Fixes for access control error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=135724"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205185 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205184 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205189 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205181 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205083 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205084 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205190 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205182 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205183 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205369 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205085 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205188 - security advisory"
      },
      {
        "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205186 - security advisory"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-8698 log"
      },
      {
        "title": "Arch Linux Advisories: [ASA-202102-34] intel-ucode: information disclosure",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-202102-34"
      },
      {
        "title": "Citrix Security Bulletins: Citrix Hypervisor Security Update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=0196318f80fa91831e1ad927f423d728"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=0bfef52a44075162940391ee650c313e"
      },
      {
        "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=892287da75187b64a9430d6c2f52fb94"
      },
      {
        "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=f872c139829b190dd155b5676016edf1"
      },
      {
        "title": "HP: HPSBHF03705 rev. 1 - BIOS November 2020 Security Updates",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbhf03705"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-668",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698"
      },
      {
        "trust": 1.7,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
      },
      {
        "trust": 1.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/maagik5cxkbpgy3r4ur5vo56m7mklz43/"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
      },
      {
        "trust": 1.7,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-8698"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu91051134/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-8695"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-8696"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3959/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021081834"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/160035/ubuntu-security-notice-usn-4628-2.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4200/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4153/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/160018/ubuntu-security-notice-usn-4628-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4327/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/160187/red-hat-security-advisory-2020-5184-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021081125"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021083127"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.2355"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/intel-processors-information-disclosure-33881"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4033/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2905"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4017/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162588/ubuntu-security-notice-usn-4628-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4124/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0423"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2721"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021080915"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2604"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2945"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-49266"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2672"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/160407/red-hat-security-advisory-2020-5369-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1664"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2797"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-24511"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-24512"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-24489"
      },
      {
        "trust": 0.4,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0543"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0549"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-0548"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.2,
        "url": "https://usn.ubuntu.com/4628-1"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/668.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:5185"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05"
      },
      {
        "trust": 0.1,
        "url": "https://support.hp.com/us-en/document/c06962236"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3255"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3323"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3028"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3029"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:5181"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:5183"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4628-2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/bugs/1903883"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.2"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163758"
      },
      {
        "db": "PACKETSTORM",
        "id": "163772"
      },
      {
        "db": "PACKETSTORM",
        "id": "160191"
      },
      {
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "db": "PACKETSTORM",
        "id": "160188"
      },
      {
        "db": "PACKETSTORM",
        "id": "160035"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "db": "PACKETSTORM",
        "id": "163758"
      },
      {
        "db": "PACKETSTORM",
        "id": "163772"
      },
      {
        "db": "PACKETSTORM",
        "id": "160191"
      },
      {
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "db": "PACKETSTORM",
        "id": "160188"
      },
      {
        "db": "PACKETSTORM",
        "id": "160035"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-11-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "date": "2021-07-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "date": "2021-08-27T19:22:22",
        "db": "PACKETSTORM",
        "id": "163924"
      },
      {
        "date": "2021-08-31T15:43:48",
        "db": "PACKETSTORM",
        "id": "163954"
      },
      {
        "date": "2021-08-09T14:15:45",
        "db": "PACKETSTORM",
        "id": "163758"
      },
      {
        "date": "2021-08-10T14:49:53",
        "db": "PACKETSTORM",
        "id": "163772"
      },
      {
        "date": "2020-11-24T15:00:08",
        "db": "PACKETSTORM",
        "id": "160191"
      },
      {
        "date": "2020-11-11T14:59:21",
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "date": "2020-11-24T14:59:25",
        "db": "PACKETSTORM",
        "id": "160188"
      },
      {
        "date": "2020-11-12T15:38:50",
        "db": "PACKETSTORM",
        "id": "160035"
      },
      {
        "date": "2019-11-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      },
      {
        "date": "2020-11-12T18:15:00",
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-04-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-8698"
      },
      {
        "date": "2021-07-02T04:40:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      },
      {
        "date": "2022-05-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      },
      {
        "date": "2022-04-26T16:33:00",
        "db": "NVD",
        "id": "CVE-2020-8698"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "160018"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Intel(R)\u00a0 Vulnerabilities in processor products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-013420"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access control error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1657"
      }
    ],
    "trust": 0.6
  }
}

CVE-2023-23908 (GCVE-0-2023-23908)

Vulnerability from nvd – Published: 2023-08-11 02:37 – Updated: 2025-02-13 16:44
VLAI?
Summary
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
CWE
  • information disclosure
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a 3rd Generation Intel(R) Xeon(R) Scalable processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:42:27.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5474"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0003/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-23908",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T13:35:03.846038Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T13:40:45.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "3rd Generation Intel(R) Xeon(R) Scalable processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:38.728Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5474"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0003/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-23908",
    "datePublished": "2023-08-11T02:37:07.578Z",
    "dateReserved": "2023-01-27T04:00:04.231Z",
    "dateUpdated": "2025-02-13T16:44:11.220Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-40982 (GCVE-0-2022-40982)

Vulnerability from nvd – Published: 2023-08-11 02:37 – Updated: 2025-02-13 16:33
VLAI?

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:28:42.939Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://xenbits.xen.org/xsa/advisory-435.html"
          },
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://downfall.page"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/solutions/7027704"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://xenbits.xen.org/xsa/advisory-435.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230811-0001/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5474"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5475"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-40982",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-31T20:33:43.011314Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-31T20:43:52.375Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-1342",
              "description": "Information exposure through microarchitectural state after transient execution",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-27T02:06:52.425Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
        },
        {
          "url": "https://downfall.page"
        },
        {
          "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"
        },
        {
          "url": "https://access.redhat.com/solutions/7027704"
        },
        {
          "url": "https://xenbits.xen.org/xsa/advisory-435.html"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230811-0001/"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5474"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5475"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-40982",
    "datePublished": "2023-08-11T02:37:05.423Z",
    "dateReserved": "2022-09-27T00:28:29.203Z",
    "dateUpdated": "2025-02-13T16:33:03.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-24512 (GCVE-0-2020-24512)

Vulnerability from nvd – Published: 2021-06-09 18:53 – Updated: 2024-08-04 15:12
VLAI?
Summary
Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.097Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-10T11:06:20.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24512",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210611-0005/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24512",
    "datePublished": "2021-06-09T18:53:59.000Z",
    "dateReserved": "2020-08-19T00:00:00.000Z",
    "dateUpdated": "2024-08-04T15:12:09.097Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-24511 (GCVE-0-2020-24511)

Vulnerability from nvd – Published: 2021-06-09 18:53 – Updated: 2024-08-04 15:12
VLAI?
Summary
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-10T11:06:39.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24511",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210611-0005/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24511",
    "datePublished": "2021-06-09T18:53:53.000Z",
    "dateReserved": "2020-08-19T00:00:00.000Z",
    "dateUpdated": "2024-08-04T15:12:09.012Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-8698 (GCVE-0-2020-8698)

Vulnerability from nvd – Published: 2020-11-12 18:01 – Updated: 2024-08-04 10:03
VLAI?
Summary
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
          },
          {
            "name": "FEDORA-2020-14fda1bf85",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
          },
          {
            "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-11T12:06:29.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
        },
        {
          "name": "FEDORA-2020-14fda1bf85",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
        },
        {
          "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8698",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20201113-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
            },
            {
              "name": "FEDORA-2020-14fda1bf85",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
            },
            {
              "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8698",
    "datePublished": "2020-11-12T18:01:55.000Z",
    "dateReserved": "2020-02-06T00:00:00.000Z",
    "dateUpdated": "2024-08-04T10:03:46.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-8696 (GCVE-0-2020-8696)

Vulnerability from nvd – Published: 2020-11-12 18:02 – Updated: 2024-08-04 10:03
VLAI?
Summary
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
          },
          {
            "name": "FEDORA-2020-14fda1bf85",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
          },
          {
            "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-05T20:06:12.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
        },
        {
          "name": "FEDORA-2020-14fda1bf85",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
        },
        {
          "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8696",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20201113-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
            },
            {
              "name": "FEDORA-2020-14fda1bf85",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
            },
            {
              "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8696",
    "datePublished": "2020-11-12T18:02:06.000Z",
    "dateReserved": "2020-02-06T00:00:00.000Z",
    "dateUpdated": "2024-08-04T10:03:46.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-23908 (GCVE-0-2023-23908)

Vulnerability from cvelistv5 – Published: 2023-08-11 02:37 – Updated: 2025-02-13 16:44
VLAI?
Summary
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
CWE
  • information disclosure
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a 3rd Generation Intel(R) Xeon(R) Scalable processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:42:27.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5474"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0003/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-23908",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T13:35:03.846038Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T13:40:45.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "3rd Generation Intel(R) Xeon(R) Scalable processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:38.728Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5474"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0003/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-23908",
    "datePublished": "2023-08-11T02:37:07.578Z",
    "dateReserved": "2023-01-27T04:00:04.231Z",
    "dateUpdated": "2025-02-13T16:44:11.220Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-40982 (GCVE-0-2022-40982)

Vulnerability from cvelistv5 – Published: 2023-08-11 02:37 – Updated: 2025-02-13 16:33
VLAI?

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:28:42.939Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://xenbits.xen.org/xsa/advisory-435.html"
          },
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://downfall.page"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/solutions/7027704"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://xenbits.xen.org/xsa/advisory-435.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230811-0001/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5474"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5475"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-40982",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-31T20:33:43.011314Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-31T20:43:52.375Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-1342",
              "description": "Information exposure through microarchitectural state after transient execution",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-27T02:06:52.425Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"
        },
        {
          "url": "https://downfall.page"
        },
        {
          "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"
        },
        {
          "url": "https://access.redhat.com/solutions/7027704"
        },
        {
          "url": "https://xenbits.xen.org/xsa/advisory-435.html"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230811-0001/"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5474"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5475"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-40982",
    "datePublished": "2023-08-11T02:37:05.423Z",
    "dateReserved": "2022-09-27T00:28:29.203Z",
    "dateUpdated": "2025-02-13T16:33:03.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-24512 (GCVE-0-2020-24512)

Vulnerability from cvelistv5 – Published: 2021-06-09 18:53 – Updated: 2024-08-04 15:12
VLAI?
Summary
Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.097Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-10T11:06:20.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24512",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210611-0005/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24512",
    "datePublished": "2021-06-09T18:53:59.000Z",
    "dateReserved": "2020-08-19T00:00:00.000Z",
    "dateUpdated": "2024-08-04T15:12:09.097Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-24511 (GCVE-0-2020-24511)

Vulnerability from cvelistv5 – Published: 2021-06-09 18:53 – Updated: 2024-08-04 15:12
VLAI?
Summary
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-10T11:06:39.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24511",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210611-0005/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20210611-0005/"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24511",
    "datePublished": "2021-06-09T18:53:53.000Z",
    "dateReserved": "2020-08-19T00:00:00.000Z",
    "dateUpdated": "2024-08-04T15:12:09.012Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-8696 (GCVE-0-2020-8696)

Vulnerability from cvelistv5 – Published: 2020-11-12 18:02 – Updated: 2024-08-04 10:03
VLAI?
Summary
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
          },
          {
            "name": "FEDORA-2020-14fda1bf85",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
          },
          {
            "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-05T20:06:12.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
        },
        {
          "name": "FEDORA-2020-14fda1bf85",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
        },
        {
          "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8696",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20201113-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
            },
            {
              "name": "FEDORA-2020-14fda1bf85",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
            },
            {
              "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8696",
    "datePublished": "2020-11-12T18:02:06.000Z",
    "dateReserved": "2020-02-06T00:00:00.000Z",
    "dateUpdated": "2024-08-04T10:03:46.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-8698 (GCVE-0-2020-8698)

Vulnerability from cvelistv5 – Published: 2020-11-12 18:01 – Updated: 2024-08-04 10:03
VLAI?
Summary
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • information disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Processors Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
          },
          {
            "name": "FEDORA-2020-14fda1bf85",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
          },
          {
            "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Processors",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-11T12:06:29.000Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
        },
        {
          "name": "FEDORA-2020-14fda1bf85",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
        },
        {
          "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8698",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20201113-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20201113-0006/"
            },
            {
              "name": "FEDORA-2020-14fda1bf85",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/"
            },
            {
              "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8698",
    "datePublished": "2020-11-12T18:01:55.000Z",
    "dateReserved": "2020-02-06T00:00:00.000Z",
    "dateUpdated": "2024-08-04T10:03:46.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}