var-202102-0068
Vulnerability from variot

Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. There is a security vulnerability in Intel Graphics Drivers. There is no information about this vulnerability at present. Please pay attention to CNNVD or manufacturer announcements at any time. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:2106-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2106 Issue date: 2021-05-25 CVE Names: CVE-2020-0466 CVE-2020-12362 CVE-2020-28374 CVE-2021-3347 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat CodeReady Linux Builder EUS (v. 8.1) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)

  • kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)

  • kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)

  • kernel: Use after free via PI futex state (CVE-2021-3347)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)

  • RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device teardown (xive/pci) (BZ#1931926)

  • [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with error -22 (BZ#1947115)

  • [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1952072)

  • [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability on Haswell and Broadwell servers (BZ#1956686)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Package List:

Red Hat Enterprise Linux BaseOS EUS (v. 8.1):

Source: kernel-4.18.0-147.48.1.el8_1.src.rpm

aarch64: bpftool-4.18.0-147.48.1.el8_1.aarch64.rpm bpftool-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-core-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-cross-headers-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-core-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-devel-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-modules-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-modules-extra-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-devel-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-headers-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-modules-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-modules-extra-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-tools-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-tools-libs-4.18.0-147.48.1.el8_1.aarch64.rpm perf-4.18.0-147.48.1.el8_1.aarch64.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm python3-perf-4.18.0-147.48.1.el8_1.aarch64.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm

noarch: kernel-abi-whitelists-4.18.0-147.48.1.el8_1.noarch.rpm kernel-doc-4.18.0-147.48.1.el8_1.noarch.rpm

ppc64le: bpftool-4.18.0-147.48.1.el8_1.ppc64le.rpm bpftool-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-core-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-cross-headers-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-core-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-devel-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-modules-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-modules-extra-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-devel-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-headers-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-modules-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-modules-extra-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-tools-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-tools-libs-4.18.0-147.48.1.el8_1.ppc64le.rpm perf-4.18.0-147.48.1.el8_1.ppc64le.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm python3-perf-4.18.0-147.48.1.el8_1.ppc64le.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm

s390x: bpftool-4.18.0-147.48.1.el8_1.s390x.rpm bpftool-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm kernel-4.18.0-147.48.1.el8_1.s390x.rpm kernel-core-4.18.0-147.48.1.el8_1.s390x.rpm kernel-cross-headers-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debug-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debug-core-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debug-devel-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debug-modules-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debug-modules-extra-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-147.48.1.el8_1.s390x.rpm kernel-devel-4.18.0-147.48.1.el8_1.s390x.rpm kernel-headers-4.18.0-147.48.1.el8_1.s390x.rpm kernel-modules-4.18.0-147.48.1.el8_1.s390x.rpm kernel-modules-extra-4.18.0-147.48.1.el8_1.s390x.rpm kernel-tools-4.18.0-147.48.1.el8_1.s390x.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm kernel-zfcpdump-4.18.0-147.48.1.el8_1.s390x.rpm kernel-zfcpdump-core-4.18.0-147.48.1.el8_1.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm kernel-zfcpdump-devel-4.18.0-147.48.1.el8_1.s390x.rpm kernel-zfcpdump-modules-4.18.0-147.48.1.el8_1.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-147.48.1.el8_1.s390x.rpm perf-4.18.0-147.48.1.el8_1.s390x.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm python3-perf-4.18.0-147.48.1.el8_1.s390x.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm

x86_64: bpftool-4.18.0-147.48.1.el8_1.x86_64.rpm bpftool-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-core-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-cross-headers-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-core-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-devel-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-modules-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-modules-extra-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-devel-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-headers-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-modules-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-modules-extra-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-tools-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-tools-libs-4.18.0-147.48.1.el8_1.x86_64.rpm perf-4.18.0-147.48.1.el8_1.x86_64.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm python3-perf-4.18.0-147.48.1.el8_1.x86_64.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm

Red Hat CodeReady Linux Builder EUS (v. 8.1):

aarch64: bpftool-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm kernel-tools-libs-devel-4.18.0-147.48.1.el8_1.aarch64.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm

ppc64le: bpftool-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm kernel-tools-libs-devel-4.18.0-147.48.1.el8_1.ppc64le.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm

x86_64: bpftool-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debug-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-tools-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm kernel-tools-libs-devel-4.18.0-147.48.1.el8_1.x86_64.rpm perf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm python3-perf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-0466 https://access.redhat.com/security/cve/CVE-2020-12362 https://access.redhat.com/security/cve/CVE-2020-28374 https://access.redhat.com/security/cve/CVE-2021-3347 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYK0eI9zjgjWX9erEAQi19xAAlPo/dlGKDEIFAngimDRk7+eiyEXXfVGl 8OB2JcljeAvRsViaNUCYYygUKh4dd1FAxzJip8kc8VSzT5EgMmoyEWoSxRY8Ws+h jEiUHPEEO5sjsN4exTy/Zy7EoijOwMuCXJG3OaBfXus5VmGtMdJ3WA9z3X1VMYmR sXMuMW+iiICCDNXBNDkX3E6zdBLZRi2GbA0q0JxWy0P+7hN0817hUTCWE8vXrZHK 7FHjHiIQBi28axdqlBExsSo4dF/g+kZZeEwdYaeR9HY6i9MuNtsT7S02Pl6Z+owE zROQZi1fsZ15h6KWvWRi3mLibhLR6PX6fW+FvxjqBh1yLOMBXzPfDMXKklXq4GE5 mjN0pn8c/HaOObKrEYC57OSHnspIP/2Vsx773jUCb5HbLBCGuMq+apZlb/vb5yXj jH2znQTHYU/71PceNwt6LZCI11Q2jwB8KKUoqZMBbNiAdVkPIKc+OtXI9H5r7AKF 7pm/UKIcRvOMYy4412345wJolrJgEEvCL/YMF6F6tpbIzhtj6t2S3CIFZzxOYUKB 1F6chMh0CFe33XJKikWQoT0xfoZxGbbG1XZ0YiBJCvt2YrLMNL5ljX6dJS21igcU d6h4S8753nZmWsQCO1FGLahraLsggwry0i/VkBS+9D+thLylG/byHfm1fBqv993J F5OqAoLfQVo=zodN -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 6 ELS) - i386, s390x, x86_64

  1. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHSA-2021:2122

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html

This update fixes the following bug among others:

  • Previously, resources for the ClusterOperator were being created early in the update process, which led to update failures when the ClusterOperator had no status condition while Operators were updating. This bug fix changes the timing of when these resources are created. As a result, updates can take place without errors. (BZ#1959238)

Security Fix(es):

  • gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)

You may download the oc tool and use it to inspect release image metadata as follows:

(For x86_64 architecture)

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-x86_64

The image digest is sha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4

(For s390x architecture)

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-s390x

The image digest is sha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd

(For ppc64le architecture)

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le

The image digest is sha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36

All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor

  1. Solution:

For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html

Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923268 - [Assisted-4.7] [Staging] Using two both spelling "canceled" "cancelled" 1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go 1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list 1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits 1959238 - CVO creating cloud-controller-manager too early causing upgrade failures 1960103 - SR-IOV obliviously reboot the node 1961941 - Local Storage Operator using LocalVolume CR fails to create PV's when backend storage failure is simulated 1962302 - packageserver clusteroperator does not set reason or message for Available condition 1962312 - Deployment considered unhealthy despite being available and at latest generation 1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone 1963115 - Test verify /run filesystem contents failing

  1. Bugs fixed (https://bugzilla.redhat.com/):

1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation

  1. JIRA issues fixed (https://issues.jboss.org/):

LOG-1328 - Port fix to 5.0.z for BZ-1945168

  1. 8.2) - x86_64

  2. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Bug Fix(es):

  • kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source tree (BZ#1949685)

4

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0068",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "graphics drivers",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "26.20.100.7212"
      },
      {
        "model": "intel graphics drivers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": "for linux kernel 5.5"
      },
      {
        "model": "intel graphics drivers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": null
      },
      {
        "model": "intel graphics drivers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a4\u30f3\u30c6\u30eb",
        "version": "for windows 26.20.100.7212"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:windows:*:*",
                "cpe_name": [],
                "versionEndExcluding": "26.20.100.7212",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "26.20.100.7212",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "5.5",
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "162768"
      },
      {
        "db": "PACKETSTORM",
        "id": "163578"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163018"
      },
      {
        "db": "PACKETSTORM",
        "id": "162907"
      },
      {
        "db": "PACKETSTORM",
        "id": "162916"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      }
    ],
    "trust": 1.3
  },
  "cve": "CVE-2020-12362",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 4.6,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2020-12362",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-165033",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-12362",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-12362",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202102-830",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-165033",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. There is a security vulnerability in Intel Graphics Drivers. There is no information about this vulnerability at present. Please pay attention to CNNVD or manufacturer announcements at any time. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2021:2106-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:2106\nIssue date:        2021-05-25\nCVE Names:         CVE-2020-0466 CVE-2020-12362 CVE-2020-28374\n                   CVE-2021-3347\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 8.1\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder EUS (v. 8.1) - aarch64, ppc64le, x86_64\nRed Hat Enterprise Linux BaseOS EUS (v. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege\n(CVE-2020-0466)\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore\n(CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to\nadd memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)\n\n* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device\nteardown (xive/pci) (BZ#1931926)\n\n* [HPEMC 8.1 REGRESSION]  skx_uncore: probe of 0008:80:08.0 failed with\nerror -22 (BZ#1947115)\n\n* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4\n(BZ#1952072)\n\n* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability\non Haswell and Broadwell servers (BZ#1956686)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Package List:\n\nRed Hat Enterprise Linux BaseOS EUS (v. 8.1):\n\nSource:\nkernel-4.18.0-147.48.1.el8_1.src.rpm\n\naarch64:\nbpftool-4.18.0-147.48.1.el8_1.aarch64.rpm\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-core-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-cross-headers-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-core-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-devel-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-modules-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-modules-extra-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-devel-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-headers-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-modules-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-modules-extra-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-tools-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-tools-libs-4.18.0-147.48.1.el8_1.aarch64.rpm\nperf-4.18.0-147.48.1.el8_1.aarch64.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\npython3-perf-4.18.0-147.48.1.el8_1.aarch64.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\n\nnoarch:\nkernel-abi-whitelists-4.18.0-147.48.1.el8_1.noarch.rpm\nkernel-doc-4.18.0-147.48.1.el8_1.noarch.rpm\n\nppc64le:\nbpftool-4.18.0-147.48.1.el8_1.ppc64le.rpm\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-core-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-cross-headers-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-core-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-devel-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-modules-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-modules-extra-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-devel-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-headers-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-modules-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-modules-extra-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-tools-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-tools-libs-4.18.0-147.48.1.el8_1.ppc64le.rpm\nperf-4.18.0-147.48.1.el8_1.ppc64le.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\npython3-perf-4.18.0-147.48.1.el8_1.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\n\ns390x:\nbpftool-4.18.0-147.48.1.el8_1.s390x.rpm\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-core-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-cross-headers-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debug-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debug-core-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debug-devel-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debug-modules-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debug-modules-extra-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-debuginfo-common-s390x-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-devel-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-headers-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-modules-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-modules-extra-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-tools-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-zfcpdump-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-zfcpdump-core-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-zfcpdump-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-zfcpdump-devel-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-zfcpdump-modules-4.18.0-147.48.1.el8_1.s390x.rpm\nkernel-zfcpdump-modules-extra-4.18.0-147.48.1.el8_1.s390x.rpm\nperf-4.18.0-147.48.1.el8_1.s390x.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\npython3-perf-4.18.0-147.48.1.el8_1.s390x.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.s390x.rpm\n\nx86_64:\nbpftool-4.18.0-147.48.1.el8_1.x86_64.rpm\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-core-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-cross-headers-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-core-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-devel-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-modules-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-modules-extra-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-devel-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-headers-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-modules-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-modules-extra-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-tools-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-tools-libs-4.18.0-147.48.1.el8_1.x86_64.rpm\nperf-4.18.0-147.48.1.el8_1.x86_64.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\npython3-perf-4.18.0-147.48.1.el8_1.x86_64.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\n\nRed Hat CodeReady Linux Builder EUS (v. 8.1):\n\naarch64:\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\nkernel-tools-libs-devel-4.18.0-147.48.1.el8_1.aarch64.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.aarch64.rpm\n\nppc64le:\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\nkernel-tools-libs-devel-4.18.0-147.48.1.el8_1.ppc64le.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\nkernel-tools-libs-devel-4.18.0-147.48.1.el8_1.x86_64.rpm\nperf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\npython3-perf-debuginfo-4.18.0-147.48.1.el8_1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0466\nhttps://access.redhat.com/security/cve/CVE-2020-12362\nhttps://access.redhat.com/security/cve/CVE-2020-28374\nhttps://access.redhat.com/security/cve/CVE-2021-3347\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nF5OqAoLfQVo=zodN\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. 6 ELS) - i386, s390x, x86_64\n\n3. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.13. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2021:2122\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, resources for the ClusterOperator were being created early in\nthe update process, which led to update failures when the ClusterOperator\nhad no status condition while Operators were updating. This bug fix changes\nthe timing of when these resources are created. As a result, updates can\ntake place without errors. (BZ#1959238)\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index\nvalidation (CVE-2021-3121)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-x86_64\n\nThe image digest is\nsha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4\n\n(For s390x architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-s390x\n\nThe image digest is\nsha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd\n\n(For ppc64le architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le\n\nThe image digest is\nsha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1923268 - [Assisted-4.7] [Staging] Using two both spelling \"canceled\"  \"cancelled\"\n1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go\n1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list\n1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits\n1959238 - CVO creating cloud-controller-manager too early causing upgrade failures\n1960103 - SR-IOV obliviously reboot the node\n1961941 - Local Storage Operator using LocalVolume CR fails to create PV\u0027s when backend storage failure is simulated\n1962302 - packageserver clusteroperator does not set reason or message for Available condition\n1962312 - Deployment considered unhealthy despite being available and at latest generation\n1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone\n1963115 - Test verify /run filesystem contents failing\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1328 - Port fix to 5.0.z for BZ-1945168\n\n6. 8.2) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source\ntree (BZ#1949685)\n\n4",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "db": "PACKETSTORM",
        "id": "162768"
      },
      {
        "db": "PACKETSTORM",
        "id": "163578"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163018"
      },
      {
        "db": "PACKETSTORM",
        "id": "162907"
      },
      {
        "db": "PACKETSTORM",
        "id": "162916"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-12362",
        "trust": 3.2
      },
      {
        "db": "PACKETSTORM",
        "id": "162837",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162907",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162877",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "163018",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162768",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU93808918",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162626",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163188",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163578",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163789",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4047",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2029",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2073",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3443",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1799",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2180",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1688",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1732",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1820",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1866",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0472",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0787",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0861",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2711",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2439",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021072264",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021062303",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-51723",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "162916",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "163026",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162640",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163020",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162654",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162878",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163248",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163050",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-165033",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "PACKETSTORM",
        "id": "162768"
      },
      {
        "db": "PACKETSTORM",
        "id": "163578"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163018"
      },
      {
        "db": "PACKETSTORM",
        "id": "162907"
      },
      {
        "db": "PACKETSTORM",
        "id": "162916"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "id": "VAR-202102-0068",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-07-23T19:24:37.606000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "INTEL-SA-00438",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
      },
      {
        "title": "Intel Graphics Drivers Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=142591"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-190",
        "trust": 1.1
      },
      {
        "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
      },
      {
        "trust": 1.6,
        "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12362"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu93808918/index.html"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2020-12362"
      },
      {
        "trust": 0.7,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.7,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162768/red-hat-security-advisory-2021-2106-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163789/red-hat-security-advisory-2021-3119-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1866"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/intel-graphics-drivers-multiple-vulnerabilities-34748"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1688"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1820"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2711"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6520482"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021072264"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2439"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-51723"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0861"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021062303"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4047"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2180"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163188/red-hat-security-advisory-2021-2461-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0787"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1799"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1732"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2029"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0472"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162837/red-hat-security-advisory-2021-2136-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162626/red-hat-security-advisory-2021-1578-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162877/red-hat-security-advisory-2021-2121-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3443"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162907/red-hat-security-advisory-2021-2190-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163578/red-hat-security-advisory-2021-2735-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2073"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163018/red-hat-security-advisory-2021-2293-01.html"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-12114"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12114"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-0466"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0466"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28374"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-28374"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3347"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14347"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-36322"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-8286"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-28196"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-15358"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25712"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13543"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27835"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-9951"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25704"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13434"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-3842"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13776"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-24977"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-8231"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3121"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-10878"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19528"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-29362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-9948"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-13012"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0431"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-8285"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10228"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-9169"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-26116"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14363"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13584"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-26137"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-18811"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25013"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14360"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-29361"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-19528"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12464"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14314"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14356"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27619"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27786"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25643"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-9983"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3177"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9169"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3326"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-24394"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-0431"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-0342"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18811"
      },
      {
        "trust": 0.2,
        "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-25013"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-2708"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14345"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14344"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-19523"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-23336"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14361"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-8927"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10543"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25285"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-35508"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25212"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19523"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-28974"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-29363"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3842"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-10543"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-15437"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13012"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25284"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14346"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2708"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2016-10228"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10878"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11608"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-11608"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-8284"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12464"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27618"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2106"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33909"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2735"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33909"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-006"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15586"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25037"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-36242"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25037"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28935"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25034"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-16845"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25035"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-14866"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25038"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21645"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25040"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27783"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24330"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25042"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25042"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25038"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25659"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25041"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25036"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21643"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25215"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24331"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25036"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-30465"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25035"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21644"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2121"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24332"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25040"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25041"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2122"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21642"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25034"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14346"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-20305"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13776"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14345"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13543"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13584"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14347"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14360"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2136"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14314"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14344"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u"
      },
      {
        "trust": 0.1,
        "url": "https://issues.jboss.org/):"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14356"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2293"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2190"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2185"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "PACKETSTORM",
        "id": "162768"
      },
      {
        "db": "PACKETSTORM",
        "id": "163578"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163018"
      },
      {
        "db": "PACKETSTORM",
        "id": "162907"
      },
      {
        "db": "PACKETSTORM",
        "id": "162916"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "db": "PACKETSTORM",
        "id": "162768"
      },
      {
        "db": "PACKETSTORM",
        "id": "163578"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163018"
      },
      {
        "db": "PACKETSTORM",
        "id": "162907"
      },
      {
        "db": "PACKETSTORM",
        "id": "162916"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-02-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "date": "2021-11-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "date": "2021-05-26T17:05:29",
        "db": "PACKETSTORM",
        "id": "162768"
      },
      {
        "date": "2021-07-21T16:02:03",
        "db": "PACKETSTORM",
        "id": "163578"
      },
      {
        "date": "2021-06-01T14:45:29",
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "date": "2021-05-27T13:28:54",
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "date": "2021-06-09T13:15:12",
        "db": "PACKETSTORM",
        "id": "163018"
      },
      {
        "date": "2021-06-02T13:33:47",
        "db": "PACKETSTORM",
        "id": "162907"
      },
      {
        "date": "2021-06-02T13:48:59",
        "db": "PACKETSTORM",
        "id": "162916"
      },
      {
        "date": "2021-02-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      },
      {
        "date": "2021-02-17T14:15:15.123000",
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-02-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-165033"
      },
      {
        "date": "2021-11-09T09:08:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      },
      {
        "date": "2023-04-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      },
      {
        "date": "2023-04-01T22:15:07.147000",
        "db": "NVD",
        "id": "CVE-2020-12362"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Windows\u00a0 and \u00a0Linux\u00a0 for \u00a0Intel(R)\u00a0Graphics\u00a0Drivers\u00a0 Integer overflow vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016137"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202102-830"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.