Vulnerabilites related to Intel - Intel(R) Processors
cve-2019-14615
Vulnerability from cvelistv5
Published
2020-01-17 17:36
Modified
2024-08-05 00:19
Severity ?
Summary
Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
References
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.htmlx_refsource_CONFIRM
https://usn.ubuntu.com/4253-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4254-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4255-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4255-2/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4253-2/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4254-2/vendor-advisory, x_refsource_UBUNTU
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.htmlx_refsource_MISC
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.htmlx_refsource_MISC
https://usn.ubuntu.com/4285-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4287-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4286-2/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4287-2/vendor-advisory, x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlmailing-list, x_refsource_MLIST
https://usn.ubuntu.com/4284-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4286-1/vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.htmlvendor-advisory, x_refsource_SUSE
https://support.apple.com/kb/HT211100x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2020/Mar/31mailing-list, x_refsource_FULLDISC
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:19:41.439Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html",
               },
               {
                  name: "USN-4253-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4253-1/",
               },
               {
                  name: "USN-4254-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4254-1/",
               },
               {
                  name: "USN-4255-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4255-1/",
               },
               {
                  name: "USN-4255-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4255-2/",
               },
               {
                  name: "USN-4253-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4253-2/",
               },
               {
                  name: "USN-4254-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4254-2/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html",
               },
               {
                  name: "USN-4285-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4285-1/",
               },
               {
                  name: "USN-4287-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4287-1/",
               },
               {
                  name: "USN-4286-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4286-2/",
               },
               {
                  name: "USN-4287-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4287-2/",
               },
               {
                  name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
               },
               {
                  name: "USN-4284-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4284-1/",
               },
               {
                  name: "USN-4286-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4286-1/",
               },
               {
                  name: "openSUSE-SU-2020:0336",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/kb/HT211100",
               },
               {
                  name: "20200324 APPLE-SA-2020-03-24-2 macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2020/Mar/31",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Processors",
               vendor: "Intel",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-03-25T07:06:25",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html",
            },
            {
               name: "USN-4253-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4253-1/",
            },
            {
               name: "USN-4254-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4254-1/",
            },
            {
               name: "USN-4255-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4255-1/",
            },
            {
               name: "USN-4255-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4255-2/",
            },
            {
               name: "USN-4253-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4253-2/",
            },
            {
               name: "USN-4254-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4254-2/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html",
            },
            {
               name: "USN-4285-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4285-1/",
            },
            {
               name: "USN-4287-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4287-1/",
            },
            {
               name: "USN-4286-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4286-2/",
            },
            {
               name: "USN-4287-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4287-2/",
            },
            {
               name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
            },
            {
               name: "USN-4284-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4284-1/",
            },
            {
               name: "USN-4286-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4286-1/",
            },
            {
               name: "openSUSE-SU-2020:0336",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/kb/HT211100",
            },
            {
               name: "20200324 APPLE-SA-2020-03-24-2 macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2020/Mar/31",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-14615",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Processors",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html",
                  },
                  {
                     name: "USN-4253-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4253-1/",
                  },
                  {
                     name: "USN-4254-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4254-1/",
                  },
                  {
                     name: "USN-4255-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4255-1/",
                  },
                  {
                     name: "USN-4255-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4255-2/",
                  },
                  {
                     name: "USN-4253-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4253-2/",
                  },
                  {
                     name: "USN-4254-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4254-2/",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html",
                  },
                  {
                     name: "USN-4285-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4285-1/",
                  },
                  {
                     name: "USN-4287-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4287-1/",
                  },
                  {
                     name: "USN-4286-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4286-2/",
                  },
                  {
                     name: "USN-4287-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4287-2/",
                  },
                  {
                     name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
                  },
                  {
                     name: "USN-4284-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4284-1/",
                  },
                  {
                     name: "USN-4286-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4286-1/",
                  },
                  {
                     name: "openSUSE-SU-2020:0336",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html",
                  },
                  {
                     name: "https://support.apple.com/kb/HT211100",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/kb/HT211100",
                  },
                  {
                     name: "20200324 APPLE-SA-2020-03-24-2 macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2020/Mar/31",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-14615",
      datePublished: "2020-01-17T17:36:57",
      dateReserved: "2019-08-03T00:00:00",
      dateUpdated: "2024-08-05T00:19:41.439Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0548
Vulnerability from cvelistv5
Published
2020-01-28 00:02
Modified
2024-08-04 06:02
Severity ?
Summary
Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Intel Intel(R) Processors Version: see references
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.399Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200210-0004/",
               },
               {
                  name: "openSUSE-SU-2020:0791",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html",
               },
               {
                  name: "DSA-4701",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4701",
               },
               {
                  name: "[debian-lts-announce] 20200613 [SECURITY] [DLA 2248-1] intel-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html",
               },
               {
                  name: "USN-4385-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4385-1/",
               },
               {
                  name: "FEDORA-2020-e8835a5f8e",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/",
               },
               {
                  name: "FEDORA-2020-11ddbfbdf0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Processors",
               vendor: "Intel",
               versions: [
                  {
                     status: "affected",
                     version: "see references",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-26T02:06:08",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200210-0004/",
            },
            {
               name: "openSUSE-SU-2020:0791",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html",
            },
            {
               name: "DSA-4701",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4701",
            },
            {
               name: "[debian-lts-announce] 20200613 [SECURITY] [DLA 2248-1] intel-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html",
            },
            {
               name: "USN-4385-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4385-1/",
            },
            {
               name: "FEDORA-2020-e8835a5f8e",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/",
            },
            {
               name: "FEDORA-2020-11ddbfbdf0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0548",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Processors",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "see references",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200210-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200210-0004/",
                  },
                  {
                     name: "openSUSE-SU-2020:0791",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html",
                  },
                  {
                     name: "DSA-4701",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4701",
                  },
                  {
                     name: "[debian-lts-announce] 20200613 [SECURITY] [DLA 2248-1] intel-microcode security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html",
                  },
                  {
                     name: "USN-4385-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4385-1/",
                  },
                  {
                     name: "FEDORA-2020-e8835a5f8e",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/",
                  },
                  {
                     name: "FEDORA-2020-11ddbfbdf0",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0548",
      datePublished: "2020-01-28T00:02:29",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.399Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0549
Vulnerability from cvelistv5
Published
2020-01-28 00:03
Modified
2024-08-04 06:02
Severity ?
Summary
Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Intel Intel(R) Processors Version: see references
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.333Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200210-0004/",
               },
               {
                  name: "openSUSE-SU-2020:0791",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html",
               },
               {
                  name: "DSA-4701",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4701",
               },
               {
                  name: "[debian-lts-announce] 20200613 [SECURITY] [DLA 2248-1] intel-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html",
               },
               {
                  name: "USN-4385-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4385-1/",
               },
               {
                  name: "FEDORA-2020-e8835a5f8e",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/",
               },
               {
                  name: "FEDORA-2020-11ddbfbdf0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10318",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) Processors",
               vendor: "Intel",
               versions: [
                  {
                     status: "affected",
                     version: "see references",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-09-09T07:06:12",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200210-0004/",
            },
            {
               name: "openSUSE-SU-2020:0791",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html",
            },
            {
               name: "DSA-4701",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4701",
            },
            {
               name: "[debian-lts-announce] 20200613 [SECURITY] [DLA 2248-1] intel-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html",
            },
            {
               name: "USN-4385-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4385-1/",
            },
            {
               name: "FEDORA-2020-e8835a5f8e",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/",
            },
            {
               name: "FEDORA-2020-11ddbfbdf0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10318",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0549",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) Processors",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "see references",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200210-0004/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200210-0004/",
                  },
                  {
                     name: "openSUSE-SU-2020:0791",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html",
                  },
                  {
                     name: "DSA-4701",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4701",
                  },
                  {
                     name: "[debian-lts-announce] 20200613 [SECURITY] [DLA 2248-1] intel-microcode security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html",
                  },
                  {
                     name: "USN-4385-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4385-1/",
                  },
                  {
                     name: "FEDORA-2020-e8835a5f8e",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/",
                  },
                  {
                     name: "FEDORA-2020-11ddbfbdf0",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/",
                  },
                  {
                     name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10318",
                     refsource: "CONFIRM",
                     url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10318",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0549",
      datePublished: "2020-01-28T00:03:16",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.333Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}