var-202106-0349
Vulnerability from variot
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Security Fix(es):
-
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
1929858 - CVE-2021-27219 glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits 1948377 - Rebase RHV-H 4.3 EUS on RHGS 3.5.z on RHEL 7 - Batch Update 4 1957238 - Rebase RHV-H 4.3 EUS on RHEL 7.9.z #6 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1963258 - CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:3028-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3028 Issue date: 2021-08-09 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 ==================================================================== 1. Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
-
hw: Vector Register Data Sampling (CVE-2020-0548)
-
hw: L1D Cache Eviction Sampling (CVE-2020-0549)
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
-
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
-
hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
-
hw: Vector Register Leakage-Active (CVE-2020-8696)
-
hw: Fast forward store predictor (CVE-2020-8698)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor 1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT 5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl l9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv sFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj ljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL Y7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ OepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ W3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn ltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2 f+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/ yvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA UjXnNBNse8A=LIYI -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i7-11700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3060", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11320h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10325", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2805", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4020", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3150", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j2850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j4205", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10850k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900kb", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10710u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10810u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4125", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1130g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3510", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1038ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11950h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j6426", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5095", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n5030", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1800", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3010", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver a1030", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2910", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1005g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4025", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1155g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1140g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2840", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3355e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1110g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver j5005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "celeron n3000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1160g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3520", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10200h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185g7e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11375h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10870h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10910", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n6415", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n6210", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j2900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n6211", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145g7e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n4200", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1135g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1125g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4020c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11800h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1180g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1750", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3050", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2815", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1068ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10885h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115g4e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j6413", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3455", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j6412", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1195g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2806", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1120g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11390h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n6000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-l16g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3060", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j3710", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3710", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "core i3-10110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1165g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3355", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1065g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2830", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10610u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver j5040", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n5000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3350e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3530", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2820", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-11100b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11370h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n4200e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11260h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3540", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n6005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10875h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000ng4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2808", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4115", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2807", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4000c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-l13g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3455e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2810", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2020-24489" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4115:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-24489" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163044" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163758" } ], "trust": 0.8 }, "cve": "CVE-2020-24489", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-178372", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-24489", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-630", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-178372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "CNNVD", "id": "CNNVD-202106-630" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. \nThese packages include redhat-release-virtualization-host. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources\nand\nperforming administrative tasks. \n\nSecurity Fix(es):\n\n* glib: integer overflow in g_bytes_new function on 64-bit platforms due to\nan implicit cast from 64 bits to 32 bits (CVE-2021-27219)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* dhcp: stack-based buffer overflow when parsing statements with\ncolon-separated hex digits in config or lease files in dhcpd and dhclient\n(CVE-2021-25217)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n1929858 - CVE-2021-27219 glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits\n1948377 - Rebase RHV-H 4.3 EUS on RHGS 3.5.z on RHEL 7 - Batch Update 4\n1957238 - Rebase RHV-H 4.3 EUS on RHEL 7.9.z #6\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1963258 - CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2021:3028-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:3028\nIssue date: 2021-08-09\nCVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549\n CVE-2020-8695 CVE-2020-8696 CVE-2020-8698\n CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1788786 - CVE-2020-0548 hw: Vector Register Data Sampling\n1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling\n1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0543\nhttps://access.redhat.com/security/cve/CVE-2020-0548\nhttps://access.redhat.com/security/cve/CVE-2020-0549\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nUjXnNBNse8A=LIYI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-24489" }, { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163044" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163758" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-24489", "trust": 2.5 }, { "db": "PACKETSTORM", "id": "163240", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "163031", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163772", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163863", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163993", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2243", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2201", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.2479", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4047", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2088", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2721", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2797", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3443", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2030", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2258", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2537", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2905", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2945", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2672", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021081834", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062312", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021083127", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021081125", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062701", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021080915", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-62742", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-630", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163037", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163044", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163042", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163032", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163047", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163040", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163043", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163242", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163036", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163046", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-178372", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163924", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163758", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163044" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "CNNVD", "id": "CNNVD-202106-630" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "id": "VAR-202106-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-178372" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:24:47.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Intel Virtualization Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=155752" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-630" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.debian.org/security/2021/dsa-4934" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "trust": 1.4, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.8, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.8, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.8, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.7, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-62742" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021081834" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2537" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.2479" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6520482" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2243" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2088" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2201" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062701" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4047" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021081125" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021083127" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163031/red-hat-security-advisory-2021-2299-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2905" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163240/red-hat-security-advisory-2021-2519-01.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/intel-processor-privilege-escalation-via-vt-d-35681" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2721" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021080915" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2945" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2672" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062312" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2258" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2797" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3443" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2030" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24513" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24513" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0548" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25217" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27219" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25217" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27219" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2519" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2302" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2306" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2308" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2304" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3029" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3255" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3028" } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163044" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "CNNVD", "id": "CNNVD-202106-630" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163044" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "CNNVD", "id": "CNNVD-202106-630" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-09T00:00:00", "db": "VULHUB", "id": "VHN-178372" }, { "date": "2021-06-22T19:32:24", "db": "PACKETSTORM", "id": "163240" }, { "date": "2021-06-09T13:26:50", "db": "PACKETSTORM", "id": "163032" }, { "date": "2021-06-09T13:28:17", "db": "PACKETSTORM", "id": "163037" }, { "date": "2021-06-09T13:40:32", "db": "PACKETSTORM", "id": "163042" }, { "date": "2021-06-09T13:40:48", "db": "PACKETSTORM", "id": "163044" }, { "date": "2021-08-10T14:49:53", "db": "PACKETSTORM", "id": "163772" }, { "date": "2021-08-27T19:22:22", "db": "PACKETSTORM", "id": "163924" }, { "date": "2021-08-09T14:15:45", "db": "PACKETSTORM", "id": "163758" }, { "date": "2021-06-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-630" }, { "date": "2021-06-09T20:15:08.140000", "db": "NVD", "id": "CVE-2020-24489" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-06T00:00:00", "db": "VULHUB", "id": "VHN-178372" }, { "date": "2023-05-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-630" }, { "date": "2022-04-06T17:07:37.537000", "db": "NVD", "id": "CVE-2020-24489" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-630" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Virtualization Technology for Direct I/O Authorization problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-630" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-630" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.