var-202203-0045
Vulnerability from variot
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. plural Intel(R) Processor Exists in unspecified vulnerabilities.Information may be obtained. A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged malicious user to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes. (CVE-2022-0001, CVE-2022-0002)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: linux-image-5.4.0-1017-ibm 5.4.0-1017.19 linux-image-5.4.0-1030-bluefield 5.4.0-1030.33 linux-image-5.4.0-1036-gkeop 5.4.0-1036.37 linux-image-5.4.0-104-generic 5.4.0-104.118 linux-image-5.4.0-104-generic-lpae 5.4.0-104.118 linux-image-5.4.0-104-lowlatency 5.4.0-104.118 linux-image-5.4.0-1055-raspi 5.4.0-1055.62 linux-image-5.4.0-1058-kvm 5.4.0-1058.61 linux-image-5.4.0-1065-gke 5.4.0-1065.68 linux-image-5.4.0-1066-oracle 5.4.0-1066.71 linux-image-5.4.0-1067-gcp 5.4.0-1067.71 linux-image-5.4.0-1068-aws 5.4.0-1068.72 linux-image-5.4.0-1072-azure 5.4.0-1072.75 linux-image-5.4.0-1072-azure-fde 5.4.0-1072.75+cvm1.1 linux-image-aws-lts-20.04 5.4.0.1068.70 linux-image-azure-fde 5.4.0.1072.75+cvm1.18 linux-image-azure-lts-20.04 5.4.0.1072.70 linux-image-bluefield 5.4.0.1030.31 linux-image-gcp-lts-20.04 5.4.0.1067.76 linux-image-generic 5.4.0.104.108 linux-image-generic-lpae 5.4.0.104.108 linux-image-gke 5.4.0.1065.75 linux-image-gke-5.4 5.4.0.1065.75 linux-image-gkeop 5.4.0.1036.39 linux-image-gkeop-5.4 5.4.0.1036.39 linux-image-ibm 5.4.0.1017.17 linux-image-ibm-lts-20.04 5.4.0.1017.17 linux-image-kvm 5.4.0.1058.57 linux-image-lowlatency 5.4.0.104.108 linux-image-oem 5.4.0.104.108 linux-image-oem-osp1 5.4.0.104.108 linux-image-oracle-lts-20.04 5.4.0.1066.66 linux-image-raspi 5.4.0.1055.89 linux-image-raspi2 5.4.0.1055.89 linux-image-virtual 5.4.0.104.108
Ubuntu 18.04 LTS: linux-image-5.4.0-1017-ibm 5.4.0-1017.19~18.04.1 linux-image-5.4.0-1036-gkeop 5.4.0-1036.37~18.04.1 linux-image-5.4.0-104-generic 5.4.0-104.118~18.04.1 linux-image-5.4.0-104-generic-lpae 5.4.0-104.118~18.04.1 linux-image-5.4.0-104-lowlatency 5.4.0-104.118~18.04.1 linux-image-5.4.0-1055-raspi 5.4.0-1055.62~18.04.1 linux-image-5.4.0-1065-gke 5.4.0-1065.68~18.04.1 linux-image-5.4.0-1066-oracle 5.4.0-1066.71~18.04.1 linux-image-5.4.0-1067-gcp 5.4.0-1067.71~18.04.1 linux-image-5.4.0-1068-aws 5.4.0-1068.72~18.04.1 linux-image-5.4.0-1072-azure 5.4.0-1072.75~18.04.1 linux-image-aws 5.4.0.1068.50 linux-image-azure 5.4.0.1072.51 linux-image-gcp 5.4.0.1067.52 linux-image-generic-hwe-18.04 5.4.0.104.118~18.04.89 linux-image-generic-lpae-hwe-18.04 5.4.0.104.118~18.04.89 linux-image-gke-5.4 5.4.0.1065.68~18.04.29 linux-image-gkeop-5.4 5.4.0.1036.37~18.04.36 linux-image-ibm 5.4.0.1017.34 linux-image-lowlatency-hwe-18.04 5.4.0.104.118~18.04.89 linux-image-oem 5.4.0.104.118~18.04.89 linux-image-oem-osp1 5.4.0.104.118~18.04.89 linux-image-oracle 5.4.0.1066.71~18.04.45 linux-image-raspi-hwe-18.04 5.4.0.1055.57 linux-image-snapdragon-hwe-18.04 5.4.0.104.118~18.04.89 linux-image-virtual-hwe-18.04 5.4.0.104.118~18.04.89
IMPORTANT: As part of this update, unprivileged eBPF is being disabled by default, as it is the primary known means of exploiting the Branch History Injection issues described above. It should be noted that other mechanisms for exploiting the underlying issues may be discovered. Also, this may cause issues for applications that rely on the unprivileged eBPF functionality. Please see the knowledge base article at https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI for more details.
After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5095-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 09, 2022 https://www.debian.org/security/faq
Package : linux CVE ID : CVE-2020-36310 CVE-2022-0001 CVE-2022-0002 CVE-2022-0487 CVE-2022-0492 CVE-2022-0617 CVE-2022-25636 Debian Bug : 990279
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2020-36310
A flaw was discovered in the KVM implementation for AMD processors,
which could lead to an infinite loop. A malicious VM guest could
exploit this to cause a denial of service.
CVE-2022-0001 (INTEL-SA-00598)
Researchers at VUSec discovered that the Branch History Buffer in
Intel processors can be exploited to create information side-
channels with speculative execution. This issue is similar to
Spectre variant 2, but requires additional mitigations on some
processors.
This can be exploited to obtain sensitive information from a
different security context, such as from user-space to the kernel,
or from a KVM guest to the kernel.
CVE-2022-0002 (INTEL-SA-00598)
This is a similar issue to CVE-2022-0001, but covers exploitation
within a security context, such as from JIT-compiled code in a
sandbox to hosting code in the same process.
This is partly mitigated by disabling eBPF for unprivileged users
with the sysctl: kernel.unprivileged_bpf_disabled=2. This is
already the default in Debian 11 "bullseye".
CVE-2022-0487
A use-after-free was discovered in the MOXART SD/MMC Host Controller
support driver. This flaw does not impact the Debian binary packages
as CONFIG_MMC_MOXART is not set.
CVE-2022-0492
Yiqi Sun and Kevin Wang reported that the cgroup-v1 subsystem does
not properly restrict access to the release-agent feature. A local
user can take advantage of this flaw for privilege escalation and
bypass of namespace isolation.
CVE-2022-0617
butt3rflyh4ck discovered a NULL pointer dereference in the UDF
filesystem. A local user that can mount a specially crafted UDF
image can use this flaw to crash the system.
CVE-2022-25636
Nick Gregory reported a heap out-of-bounds write flaw in the
netfilter subsystem. A user with the CAP_NET_ADMIN capability could
use this for denial of service or possibly for privilege escalation.
For the stable distribution (bullseye), these problems have been fixed in version 5.10.103-1. This update additionally includes many more bug fixes from stable updates 5.10.93-5.10.103 inclusive.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIotmRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Qajw//WLCg/HhmykP7eobsnnn7A0U0ONBbZi+Un6Ltueaambvlhme54l5eR4uh f8fLSehpKhEN4bzfWRnDe0vKbws557zsNnd+a000ylfkO6BqEoNL8VwMp0yOVvUt +nB39/ySIM1inH375JAWZ5M2+H8YJVBPrlm0kGxUtBwObC279atwGUINov4xrI5C RzcNa/FQ7tjUMaeBgdGAAJPImnP+zT6shhCUTlR5QLhvB9gyvthtb/OtvhbMcWlM 5gd7papoMFgWBspN21+NPmbadSEXDIpeyPanpfKu9S8Zmht69rTS+pEim6Hm682q 64m/Fb4NgCBgVUH9o8+QJUvJkHv8Z/lNDyfjSn90Eu7kcALDBqh/n+Y0q+SEwKhZ b6UPzuH+hObZk+7GDUY32t9JwlNu0qUk55nCufLVM01bVYkN5ukaXAWCyuCU83ky yY/nHRNHVISFuy6mdfiFRR7lvMcgBD0IPoU9T+cpZPl+WkwzEwyHx16RN/EDVlo6 NomcMiX07XRSwSG7h7wgFs+YxCv9TjvBoAqKS9Q7GwBX6lunItWMwz44+DxcW9SM lJPHFMju9hmqMBHI+UTUX8FMY9aq8Qyk+WFthl7eDZjOJ+lKtkEpTR3b50FXzbdc lTYZEMcNtr7AlThbIxH564DntN8YV3DCV4+Ba/DozvxSJ6kSmrA= =DHkG -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6766-1 May 07, 2024
linux, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-lowlatency: Linux low latency kernel - linux-nvidia: Linux kernel for NVIDIA systems - linux-oracle: Linux kernel for Oracle Cloud systems - linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems - linux-azure-fde-5.15: Linux kernel for Microsoft Azure CVM cloud systems - linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-gkeop-5.15: Linux kernel for Google Container Engine (GKE) systems - linux-ibm-5.15: Linux kernel for IBM cloud systems - linux-lowlatency-hwe-5.15: Linux low latency kernel - linux-oracle-5.15: Linux kernel for Oracle Cloud systems
Details:
It was discovered that the Open vSwitch implementation in the Linux kernel could overflow its stack during recursive action operations under certain conditions. (CVE-2024-1151)
Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida discovered that the Linux kernel mitigations for the initial Branch History Injection vulnerability (CVE-2022-0001) were insufficient for Intel processors. A local attacker could potentially use this to expose sensitive information. (CVE-2024-2201)
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux kernel contained an out-of-bounds read vulnerability. (CVE-2024-23849)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - PowerPC architecture; - S390 architecture; - Core kernel; - Block layer subsystem; - Android drivers; - Power management core; - Bus devices; - Hardware random number generator core; - Cryptographic API; - Device frequency; - DMA engine subsystem; - ARM SCMI message protocol; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - IIO ADC drivers; - IIO subsystem; - IIO Magnetometer sensors drivers; - InfiniBand drivers; - Media drivers; - Network drivers; - PCI driver for MicroSemi Switchtec; - PHY drivers; - SCSI drivers; - DesignWare USB3 driver; - BTRFS file system; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - NILFS2 file system; - NTFS3 file system; - Pstore file system; - SMB network file system; - Memory management; - CAN network layer; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Multipath TCP; - Netfilter; - NFC subsystem; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - Realtek audio codecs; (CVE-2023-52594, CVE-2023-52601, CVE-2024-26826, CVE-2023-52622, CVE-2024-26665, CVE-2023-52493, CVE-2023-52633, CVE-2024-26684, CVE-2024-26663, CVE-2023-52618, CVE-2023-52588, CVE-2023-52637, CVE-2024-26825, CVE-2023-52606, CVE-2024-26594, CVE-2024-26625, CVE-2024-26720, CVE-2024-26614, CVE-2023-52627, CVE-2023-52602, CVE-2024-26673, CVE-2024-26685, CVE-2023-52638, CVE-2023-52498, CVE-2023-52619, CVE-2024-26910, CVE-2024-26689, CVE-2023-52583, CVE-2024-26676, CVE-2024-26671, CVE-2024-26704, CVE-2024-26608, CVE-2024-26610, CVE-2024-26592, CVE-2023-52599, CVE-2023-52595, CVE-2024-26660, CVE-2023-52617, CVE-2024-26645, CVE-2023-52486, CVE-2023-52631, CVE-2023-52607, CVE-2023-52608, CVE-2024-26722, CVE-2024-26615, CVE-2023-52615, CVE-2024-26636, CVE-2023-52642, CVE-2023-52587, CVE-2024-26712, CVE-2024-26675, CVE-2023-52614, CVE-2024-26606, CVE-2024-26916, CVE-2024-26600, CVE-2024-26679, CVE-2024-26829, CVE-2024-26641, CVE-2023-52623, CVE-2024-26627, CVE-2024-26696, CVE-2024-26640, CVE-2024-26635, CVE-2023-52491, CVE-2024-26664, CVE-2024-26602, CVE-2023-52604, CVE-2024-26717, CVE-2023-52643, CVE-2024-26593, CVE-2023-52598, CVE-2024-26668, CVE-2023-52435, CVE-2023-52597, CVE-2024-26715, CVE-2024-26707, CVE-2023-52635, CVE-2024-26695, CVE-2024-26698, CVE-2023-52494, CVE-2024-26920, CVE-2024-26808, CVE-2023-52616, CVE-2023-52492, CVE-2024-26702, CVE-2024-26644, CVE-2023-52489, CVE-2024-26697)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS linux-image-5.15.0-1044-gkeop 5.15.0-1044.51 linux-image-5.15.0-1054-ibm 5.15.0-1054.57 linux-image-5.15.0-1054-nvidia 5.15.0-1054.55 linux-image-5.15.0-1054-nvidia-lowlatency 5.15.0-1054.55 linux-image-5.15.0-1058-gke 5.15.0-1058.63 linux-image-5.15.0-1058-kvm 5.15.0-1058.63 linux-image-5.15.0-1059-gcp 5.15.0-1059.67 linux-image-5.15.0-1059-oracle 5.15.0-1059.65 linux-image-5.15.0-106-generic 5.15.0-106.116 linux-image-5.15.0-106-generic-64k 5.15.0-106.116 linux-image-5.15.0-106-generic-lpae 5.15.0-106.116 linux-image-5.15.0-106-lowlatency 5.15.0-106.116 linux-image-5.15.0-106-lowlatency-64k 5.15.0-106.116 linux-image-5.15.0-1063-azure 5.15.0-1063.72 linux-image-5.15.0-1063-azure-fde 5.15.0-1063.72.1 linux-image-azure-fde-lts-22.04 5.15.0.1063.72.41 linux-image-azure-lts-22.04 5.15.0.1063.61 linux-image-gcp-lts-22.04 5.15.0.1059.55 linux-image-generic 5.15.0.106.106 linux-image-generic-64k 5.15.0.106.106 linux-image-generic-lpae 5.15.0.106.106 linux-image-gke 5.15.0.1058.57 linux-image-gke-5.15 5.15.0.1058.57 linux-image-gkeop 5.15.0.1044.43 linux-image-gkeop-5.15 5.15.0.1044.43 linux-image-ibm 5.15.0.1054.50 linux-image-kvm 5.15.0.1058.54 linux-image-lowlatency 5.15.0.106.101 linux-image-lowlatency-64k 5.15.0.106.101 linux-image-nvidia 5.15.0.1054.54 linux-image-nvidia-lowlatency 5.15.0.1054.54 linux-image-oracle-lts-22.04 5.15.0.1059.55 linux-image-virtual 5.15.0.106.106
Ubuntu 20.04 LTS linux-image-5.15.0-1044-gkeop 5.15.0-1044.51~20.04.1 linux-image-5.15.0-1054-ibm 5.15.0-1054.57~20.04.1 linux-image-5.15.0-1059-gcp 5.15.0-1059.67~20.04.1 linux-image-5.15.0-1059-oracle 5.15.0-1059.65~20.04.1 linux-image-5.15.0-106-lowlatency 5.15.0-106.116~20.04.1 linux-image-5.15.0-106-lowlatency-64k 5.15.0-106.116~20.04.1 linux-image-5.15.0-1063-azure 5.15.0-1063.72~20.04.1 linux-image-5.15.0-1063-azure-fde 5.15.0-1063.72~20.04.1.1 linux-image-azure 5.15.0.1063.72~20.04.1 linux-image-azure-cvm 5.15.0.1063.72~20.04.1 linux-image-azure-fde 5.15.0.1063.72~20.04.1.41 linux-image-gcp 5.15.0.1059.67~20.04.1 linux-image-gkeop-5.15 5.15.0.1044.51~20.04.1 linux-image-ibm 5.15.0.1054.57~20.04.1 linux-image-lowlatency-64k-hwe-20.04 5.15.0.106.116~20.04.1 linux-image-lowlatency-hwe-20.04 5.15.0.106.116~20.04.1 linux-image-oracle 5.15.0.1059.65~20.04.1
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-6766-1 CVE-2023-52435, CVE-2023-52486, CVE-2023-52489, CVE-2023-52491, CVE-2023-52492, CVE-2023-52493, CVE-2023-52494, CVE-2023-52498, CVE-2023-52583, CVE-2023-52587, CVE-2023-52588, CVE-2023-52594, CVE-2023-52595, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599, CVE-2023-52601, CVE-2023-52602, CVE-2023-52604, CVE-2023-52606, CVE-2023-52607, CVE-2023-52608, CVE-2023-52614, CVE-2023-52615, CVE-2023-52616, CVE-2023-52617, CVE-2023-52618, CVE-2023-52619, CVE-2023-52622, CVE-2023-52623, CVE-2023-52627, CVE-2023-52631, CVE-2023-52633, CVE-2023-52635, CVE-2023-52637, CVE-2023-52638, CVE-2023-52642, CVE-2023-52643, CVE-2024-1151, CVE-2024-2201, CVE-2024-23849, CVE-2024-26592, CVE-2024-26593, CVE-2024-26594, CVE-2024-26600, CVE-2024-26602, CVE-2024-26606, CVE-2024-26608, CVE-2024-26610, CVE-2024-26614, CVE-2024-26615, CVE-2024-26625, CVE-2024-26627, CVE-2024-26635, CVE-2024-26636, CVE-2024-26640, CVE-2024-26641, CVE-2024-26644, CVE-2024-26645, CVE-2024-26660, CVE-2024-26663, CVE-2024-26664, CVE-2024-26665, CVE-2024-26668, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26676, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26689, CVE-2024-26695, CVE-2024-26696, CVE-2024-26697, CVE-2024-26698, CVE-2024-26702, CVE-2024-26704, CVE-2024-26707, CVE-2024-26712, CVE-2024-26715, CVE-2024-26717, CVE-2024-26720, CVE-2024-26722, CVE-2024-26808, CVE-2024-26825, CVE-2024-26826, CVE-2024-26829, CVE-2024-26910, CVE-2024-26916, CVE-2024-26920
Package Information: https://launchpad.net/ubuntu/+source/linux/5.15.0-106.116 https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1063.72 https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1063.72.1 https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1059.67 https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1058.63 https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1044.51 https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1054.57 https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1058.63 https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-106.116 https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1054.55 https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1059.65 https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1063.72~20.04.1
https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1063.72~20.04.1.1 https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1059.67~20.04.1 https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1044.51~20.04.1 https://launchpad.net/ubuntu/+source/linux-ibm-5.15/5.15.0-1054.57~20.04.1
https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-106.116~20.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-5.15/5.15.0-1059.65~20.04.1
. This update corrects flaws in the following subsystems: - Netfilter; (CVE-2024-26925, CVE-2024-26643)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS linux-image-5.4.0-1039-iot 5.4.0-1039.40 linux-image-5.4.0-1046-xilinx-zynqmp 5.4.0-1046.50 linux-image-5.4.0-1074-ibm 5.4.0-1074.79 linux-image-5.4.0-1087-bluefield 5.4.0-1087.94 linux-image-5.4.0-1094-gkeop 5.4.0-1094.98 linux-image-5.4.0-1111-raspi 5.4.0-1111.123 linux-image-5.4.0-1115-kvm 5.4.0-1115.122 linux-image-5.4.0-1126-oracle 5.4.0-1126.135 linux-image-5.4.0-1127-aws 5.4.0-1127.137 linux-image-5.4.0-1131-gcp 5.4.0-1131.140 linux-image-5.4.0-1132-azure 5.4.0-1132.139 linux-image-5.4.0-187-generic 5.4.0-187.207 linux-image-5.4.0-187-generic-lpae 5.4.0-187.207 linux-image-5.4.0-187-lowlatency 5.4.0-187.207 linux-image-aws-lts-20.04 5.4.0.1127.124 linux-image-azure-lts-20.04 5.4.0.1132.126 linux-image-bluefield 5.4.0.1087.83 linux-image-gcp-lts-20.04 5.4.0.1131.133 linux-image-generic 5.4.0.187.185 linux-image-generic-lpae 5.4.0.187.185 linux-image-gkeop 5.4.0.1094.92 linux-image-gkeop-5.4 5.4.0.1094.92 linux-image-ibm-lts-20.04 5.4.0.1074.103 linux-image-kvm 5.4.0.1115.111 linux-image-lowlatency 5.4.0.187.185 linux-image-oem 5.4.0.187.185 linux-image-oem-osp1 5.4.0.187.185 linux-image-oracle-lts-20.04 5.4.0.1126.119 linux-image-raspi 5.4.0.1111.141 linux-image-raspi2 5.4.0.1111.141 linux-image-virtual 5.4.0.187.185 linux-image-xilinx-zynqmp 5.4.0.1046.46
Ubuntu 18.04 LTS linux-image-5.4.0-1074-ibm 5.4.0-1074.79~18.04.1 Available with Ubuntu Pro linux-image-5.4.0-1111-raspi 5.4.0-1111.123~18.04.1 Available with Ubuntu Pro linux-image-5.4.0-1126-oracle 5.4.0-1126.135~18.04.1 Available with Ubuntu Pro linux-image-5.4.0-1132-azure 5.4.0-1132.139~18.04.1 Available with Ubuntu Pro linux-image-5.4.0-187-generic 5.4.0-187.207~18.04.1 Available with Ubuntu Pro linux-image-5.4.0-187-lowlatency 5.4.0-187.207~18.04.1 Available with Ubuntu Pro linux-image-azure 5.4.0.1132.139~18.04.1 Available with Ubuntu Pro linux-image-generic-hwe-18.04 5.4.0.187.207~18.04.1 Available with Ubuntu Pro linux-image-ibm 5.4.0.1074.79~18.04.1 Available with Ubuntu Pro linux-image-lowlatency-hwe-18.04 5.4.0.187.207~18.04.1 Available with Ubuntu Pro linux-image-oem 5.4.0.187.207~18.04.1 Available with Ubuntu Pro linux-image-oem-osp1 5.4.0.187.207~18.04.1 Available with Ubuntu Pro linux-image-oracle 5.4.0.1126.135~18.04.1 Available with Ubuntu Pro linux-image-raspi-hwe-18.04 5.4.0.1111.123~18.04.1 Available with Ubuntu Pro linux-image-snapdragon-hwe-18.04 5.4.0.187.207~18.04.1 Available with Ubuntu Pro linux-image-virtual-hwe-18.04 5.4.0.187.207~18.04.1 Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0045", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xeon w-10885m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8256", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6328hl", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 9242", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2295", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-12100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-12100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold 7505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11155mle", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-8100y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8352m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10870h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1160g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6262v", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1250", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6427fe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1005g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2378", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11320h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5318y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8368", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 6305e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6240r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g6900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1130g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12450h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 6305", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8360y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9820x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1260p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6326", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8362", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5218", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1165g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2386g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6242r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4316", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6208u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g7400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4310t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3275m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6334", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1220p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2265", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6330n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1125g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1390p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n5030", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10710u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6212u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1120g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12650h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6405", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j6413", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9880h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon d2700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2356g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1390t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6238", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3265", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g6900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 9282", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6211e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon d1700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11865mre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5925", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4214y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4210", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5318h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10325", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7800x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7640x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6248r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6248", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8358p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11375h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6505t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver j5040", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5205u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6346", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-10855m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5215", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11555mle", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1290p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2374g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6212re", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2388g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6238l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6242", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8376hl", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6250l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n6005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2334", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6222v", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8380h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7740x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145g7e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom p5942b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11850he", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11855m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5220r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1135g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 9222", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8360hl", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5217", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1250p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1270p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3265m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1290t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1110g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12700h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8380hl", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11260h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6230n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1065g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9750hf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6200fe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8380", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6330h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10810u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n6000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6258r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-12300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6605", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2255", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6252n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-11100he", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8356h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8500y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5215l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8253", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11155mre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5315y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "communications cloud native core binding support function", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "22.1.3" }, { "model": "core i5-10500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10850k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5218n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n6415", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom p5921b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8276", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-12100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6240y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5317", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12600h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278ge", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6405t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8352v", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4310", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8352y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5320t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2288g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4504", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185g7e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5905t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon bronze 3204", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6338", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "communications cloud native core network exposure function", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "22.1.1" }, { "model": "core i5-12400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11950h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4314", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 5305u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6425re", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5220t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8365u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5318n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8353h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6338t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8358", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10610u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-10855", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8368q", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11955m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5218t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11555mre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1140g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9800x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6312u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6336y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4208", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-12300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1390", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2324g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 6600he", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5318s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6226", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6348", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6256", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4214", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8352s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115g4e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5305u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8351n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6354", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1240p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6314u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom p5931b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1250p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1155g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3223", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1195g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "communications cloud native core policy", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "22.2.0" }, { "model": "core i7-9700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4025", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1270p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6240l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6338n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4215r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5320h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1280p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2378g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4214r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4215", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-l13g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-l16g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5218r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j6425", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 9221", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1370", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-11865mld", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8280l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8376h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-7940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1290te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2223", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n5000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2314", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4210r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6252", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon bronze 3206r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2286m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10200h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5218b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8260y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3245m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver j5005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1350p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4125", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4309y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6238r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4209t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278gel", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11370h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g7400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6230t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1370p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-3235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n6211", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-2245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12800h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6234", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8665u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6246r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6328h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11800h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6209u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6254", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1180g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8565u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6230r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6238t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5220s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom p5962b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6425e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4020", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 5222", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6244", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-12700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6246", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6413e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8265u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8268", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-12500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8276l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6250", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1290e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10885h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8354h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-12900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6342", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon w-1350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2336", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4216", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6348h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8360h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11390h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum 8260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold g6500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10875h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver 4210t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g5905", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold 6226r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x6425re", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom p5931b", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom x6413e", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom x6425e", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom p5942b", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom p5962b", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom x6211e", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom x6200fe", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom p5921b", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "atom x6212re", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "NVD", "id": "CVE-2022-0001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-0001" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "166243" }, { "db": "PACKETSTORM", "id": "166248" }, { "db": "PACKETSTORM", "id": "178504" }, { "db": "PACKETSTORM", "id": "178614" }, { "db": "PACKETSTORM", "id": "178635" }, { "db": "PACKETSTORM", "id": "179349" }, { "db": "PACKETSTORM", "id": "179497" } ], "trust": 0.7 }, "cve": "CVE-2022-0001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-0001", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-404550", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-0001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-0001", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202203-688", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-404550", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-0001", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-404550" }, { "db": "VULMON", "id": "CVE-2022-0001" }, { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "CNNVD", "id": "CNNVD-202203-688" }, { "db": "NVD", "id": "CVE-2022-0001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. plural Intel(R) Processor Exists in unspecified vulnerabilities.Information may be obtained. A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged malicious user to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes. (CVE-2022-0001,\nCVE-2022-0002)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.04 LTS:\n linux-image-5.4.0-1017-ibm 5.4.0-1017.19\n linux-image-5.4.0-1030-bluefield 5.4.0-1030.33\n linux-image-5.4.0-1036-gkeop 5.4.0-1036.37\n linux-image-5.4.0-104-generic 5.4.0-104.118\n linux-image-5.4.0-104-generic-lpae 5.4.0-104.118\n linux-image-5.4.0-104-lowlatency 5.4.0-104.118\n linux-image-5.4.0-1055-raspi 5.4.0-1055.62\n linux-image-5.4.0-1058-kvm 5.4.0-1058.61\n linux-image-5.4.0-1065-gke 5.4.0-1065.68\n linux-image-5.4.0-1066-oracle 5.4.0-1066.71\n linux-image-5.4.0-1067-gcp 5.4.0-1067.71\n linux-image-5.4.0-1068-aws 5.4.0-1068.72\n linux-image-5.4.0-1072-azure 5.4.0-1072.75\n linux-image-5.4.0-1072-azure-fde 5.4.0-1072.75+cvm1.1\n linux-image-aws-lts-20.04 5.4.0.1068.70\n linux-image-azure-fde 5.4.0.1072.75+cvm1.18\n linux-image-azure-lts-20.04 5.4.0.1072.70\n linux-image-bluefield 5.4.0.1030.31\n linux-image-gcp-lts-20.04 5.4.0.1067.76\n linux-image-generic 5.4.0.104.108\n linux-image-generic-lpae 5.4.0.104.108\n linux-image-gke 5.4.0.1065.75\n linux-image-gke-5.4 5.4.0.1065.75\n linux-image-gkeop 5.4.0.1036.39\n linux-image-gkeop-5.4 5.4.0.1036.39\n linux-image-ibm 5.4.0.1017.17\n linux-image-ibm-lts-20.04 5.4.0.1017.17\n linux-image-kvm 5.4.0.1058.57\n linux-image-lowlatency 5.4.0.104.108\n linux-image-oem 5.4.0.104.108\n linux-image-oem-osp1 5.4.0.104.108\n linux-image-oracle-lts-20.04 5.4.0.1066.66\n linux-image-raspi 5.4.0.1055.89\n linux-image-raspi2 5.4.0.1055.89\n linux-image-virtual 5.4.0.104.108\n\nUbuntu 18.04 LTS:\n linux-image-5.4.0-1017-ibm 5.4.0-1017.19~18.04.1\n linux-image-5.4.0-1036-gkeop 5.4.0-1036.37~18.04.1\n linux-image-5.4.0-104-generic 5.4.0-104.118~18.04.1\n linux-image-5.4.0-104-generic-lpae 5.4.0-104.118~18.04.1\n linux-image-5.4.0-104-lowlatency 5.4.0-104.118~18.04.1\n linux-image-5.4.0-1055-raspi 5.4.0-1055.62~18.04.1\n linux-image-5.4.0-1065-gke 5.4.0-1065.68~18.04.1\n linux-image-5.4.0-1066-oracle 5.4.0-1066.71~18.04.1\n linux-image-5.4.0-1067-gcp 5.4.0-1067.71~18.04.1\n linux-image-5.4.0-1068-aws 5.4.0-1068.72~18.04.1\n linux-image-5.4.0-1072-azure 5.4.0-1072.75~18.04.1\n linux-image-aws 5.4.0.1068.50\n linux-image-azure 5.4.0.1072.51\n linux-image-gcp 5.4.0.1067.52\n linux-image-generic-hwe-18.04 5.4.0.104.118~18.04.89\n linux-image-generic-lpae-hwe-18.04 5.4.0.104.118~18.04.89\n linux-image-gke-5.4 5.4.0.1065.68~18.04.29\n linux-image-gkeop-5.4 5.4.0.1036.37~18.04.36\n linux-image-ibm 5.4.0.1017.34\n linux-image-lowlatency-hwe-18.04 5.4.0.104.118~18.04.89\n linux-image-oem 5.4.0.104.118~18.04.89\n linux-image-oem-osp1 5.4.0.104.118~18.04.89\n linux-image-oracle 5.4.0.1066.71~18.04.45\n linux-image-raspi-hwe-18.04 5.4.0.1055.57\n linux-image-snapdragon-hwe-18.04 5.4.0.104.118~18.04.89\n linux-image-virtual-hwe-18.04 5.4.0.104.118~18.04.89\n\nIMPORTANT: As part of this update, unprivileged eBPF is being\ndisabled by default, as it is the primary known means of exploiting\nthe Branch History Injection issues described above. It should be\nnoted that other mechanisms for exploiting the underlying issues may\nbe discovered. Also, this may cause issues for applications that\nrely on the unprivileged eBPF functionality. Please see the knowledge\nbase article at https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI\nfor more details. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5095-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nMarch 09, 2022 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2020-36310 CVE-2022-0001 CVE-2022-0002 CVE-2022-0487\n CVE-2022-0492 CVE-2022-0617 CVE-2022-25636\nDebian Bug : 990279\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks. \n\nCVE-2020-36310\n\n A flaw was discovered in the KVM implementation for AMD processors,\n which could lead to an infinite loop. A malicious VM guest could\n exploit this to cause a denial of service. \n\nCVE-2022-0001 (INTEL-SA-00598)\n\n Researchers at VUSec discovered that the Branch History Buffer in\n Intel processors can be exploited to create information side-\n channels with speculative execution. This issue is similar to\n Spectre variant 2, but requires additional mitigations on some\n processors. \n\n This can be exploited to obtain sensitive information from a\n different security context, such as from user-space to the kernel,\n or from a KVM guest to the kernel. \n\nCVE-2022-0002 (INTEL-SA-00598)\n\n This is a similar issue to CVE-2022-0001, but covers exploitation\n within a security context, such as from JIT-compiled code in a\n sandbox to hosting code in the same process. \n\n This is partly mitigated by disabling eBPF for unprivileged users\n with the sysctl: kernel.unprivileged_bpf_disabled=2. This is\n already the default in Debian 11 \"bullseye\". \n\nCVE-2022-0487\n\n A use-after-free was discovered in the MOXART SD/MMC Host Controller\n support driver. This flaw does not impact the Debian binary packages\n as CONFIG_MMC_MOXART is not set. \n\nCVE-2022-0492\n\n Yiqi Sun and Kevin Wang reported that the cgroup-v1 subsystem does\n not properly restrict access to the release-agent feature. A local\n user can take advantage of this flaw for privilege escalation and\n bypass of namespace isolation. \n\nCVE-2022-0617\n\n butt3rflyh4ck discovered a NULL pointer dereference in the UDF\n filesystem. A local user that can mount a specially crafted UDF\n image can use this flaw to crash the system. \n\nCVE-2022-25636\n\n Nick Gregory reported a heap out-of-bounds write flaw in the\n netfilter subsystem. A user with the CAP_NET_ADMIN capability could\n use this for denial of service or possibly for privilege escalation. \n\nFor the stable distribution (bullseye), these problems have been fixed\nin version 5.10.103-1. This update additionally includes many more\nbug fixes from stable updates 5.10.93-5.10.103 inclusive. \n\nWe recommend that you upgrade your linux packages. \n\nFor the detailed security status of linux please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nlTYZEMcNtr7AlThbIxH564DntN8YV3DCV4+Ba/DozvxSJ6kSmrA=\n=DHkG\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-6766-1\nMay 07, 2024\n\nlinux, linux-azure, linux-azure-5.15, linux-azure-fde,\nlinux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop,\nlinux-gkeop-5.15, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency,\nlinux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15\nvulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n- linux-azure: Linux kernel for Microsoft Azure Cloud systems\n- linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems\n- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-gke: Linux kernel for Google Container Engine (GKE) systems\n- linux-gkeop: Linux kernel for Google Container Engine (GKE) systems\n- linux-ibm: Linux kernel for IBM cloud systems\n- linux-kvm: Linux kernel for cloud environments\n- linux-lowlatency: Linux low latency kernel\n- linux-nvidia: Linux kernel for NVIDIA systems\n- linux-oracle: Linux kernel for Oracle Cloud systems\n- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems\n- linux-azure-fde-5.15: Linux kernel for Microsoft Azure CVM cloud systems\n- linux-gcp-5.15: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-gkeop-5.15: Linux kernel for Google Container Engine (GKE) systems\n- linux-ibm-5.15: Linux kernel for IBM cloud systems\n- linux-lowlatency-hwe-5.15: Linux low latency kernel\n- linux-oracle-5.15: Linux kernel for Oracle Cloud systems\n\nDetails:\n\nIt was discovered that the Open vSwitch implementation in the Linux kernel\ncould overflow its stack during recursive action operations under certain\nconditions. (CVE-2024-1151)\n\nSander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida\ndiscovered that the Linux kernel mitigations for the initial Branch History\nInjection vulnerability (CVE-2022-0001) were insufficient for Intel\nprocessors. A local attacker could potentially use this to expose sensitive\ninformation. (CVE-2024-2201)\n\nChenyuan Yang discovered that the RDS Protocol implementation in the Linux\nkernel contained an out-of-bounds read vulnerability. (CVE-2024-23849)\n\nSeveral security issues were discovered in the Linux kernel. \nAn attacker could possibly use these to compromise the system. \nThis update corrects flaws in the following subsystems:\n - PowerPC architecture;\n - S390 architecture;\n - Core kernel;\n - Block layer subsystem;\n - Android drivers;\n - Power management core;\n - Bus devices;\n - Hardware random number generator core;\n - Cryptographic API;\n - Device frequency;\n - DMA engine subsystem;\n - ARM SCMI message protocol;\n - GPU drivers;\n - HID subsystem;\n - Hardware monitoring drivers;\n - I2C subsystem;\n - IIO ADC drivers;\n - IIO subsystem;\n - IIO Magnetometer sensors drivers;\n - InfiniBand drivers;\n - Media drivers;\n - Network drivers;\n - PCI driver for MicroSemi Switchtec;\n - PHY drivers;\n - SCSI drivers;\n - DesignWare USB3 driver;\n - BTRFS file system;\n - Ceph distributed file system;\n - Ext4 file system;\n - F2FS file system;\n - JFS file system;\n - NILFS2 file system;\n - NTFS3 file system;\n - Pstore file system;\n - SMB network file system;\n - Memory management;\n - CAN network layer;\n - Networking core;\n - HSR network protocol;\n - IPv4 networking;\n - IPv6 networking;\n - Logical Link layer;\n - Multipath TCP;\n - Netfilter;\n - NFC subsystem;\n - SMC sockets;\n - Sun RPC protocol;\n - TIPC protocol;\n - Unix domain sockets;\n - Realtek audio codecs;\n(CVE-2023-52594, CVE-2023-52601, CVE-2024-26826, CVE-2023-52622,\nCVE-2024-26665, CVE-2023-52493, CVE-2023-52633, CVE-2024-26684,\nCVE-2024-26663, CVE-2023-52618, CVE-2023-52588, CVE-2023-52637,\nCVE-2024-26825, CVE-2023-52606, CVE-2024-26594, CVE-2024-26625,\nCVE-2024-26720, CVE-2024-26614, CVE-2023-52627, CVE-2023-52602,\nCVE-2024-26673, CVE-2024-26685, CVE-2023-52638, CVE-2023-52498,\nCVE-2023-52619, CVE-2024-26910, CVE-2024-26689, CVE-2023-52583,\nCVE-2024-26676, CVE-2024-26671, CVE-2024-26704, CVE-2024-26608,\nCVE-2024-26610, CVE-2024-26592, CVE-2023-52599, CVE-2023-52595,\nCVE-2024-26660, CVE-2023-52617, CVE-2024-26645, CVE-2023-52486,\nCVE-2023-52631, CVE-2023-52607, CVE-2023-52608, CVE-2024-26722,\nCVE-2024-26615, CVE-2023-52615, CVE-2024-26636, CVE-2023-52642,\nCVE-2023-52587, CVE-2024-26712, CVE-2024-26675, CVE-2023-52614,\nCVE-2024-26606, CVE-2024-26916, CVE-2024-26600, CVE-2024-26679,\nCVE-2024-26829, CVE-2024-26641, CVE-2023-52623, CVE-2024-26627,\nCVE-2024-26696, CVE-2024-26640, CVE-2024-26635, CVE-2023-52491,\nCVE-2024-26664, CVE-2024-26602, CVE-2023-52604, CVE-2024-26717,\nCVE-2023-52643, CVE-2024-26593, CVE-2023-52598, CVE-2024-26668,\nCVE-2023-52435, CVE-2023-52597, CVE-2024-26715, CVE-2024-26707,\nCVE-2023-52635, CVE-2024-26695, CVE-2024-26698, CVE-2023-52494,\nCVE-2024-26920, CVE-2024-26808, CVE-2023-52616, CVE-2023-52492,\nCVE-2024-26702, CVE-2024-26644, CVE-2023-52489, CVE-2024-26697)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 22.04 LTS\n linux-image-5.15.0-1044-gkeop 5.15.0-1044.51\n linux-image-5.15.0-1054-ibm 5.15.0-1054.57\n linux-image-5.15.0-1054-nvidia 5.15.0-1054.55\n linux-image-5.15.0-1054-nvidia-lowlatency 5.15.0-1054.55\n linux-image-5.15.0-1058-gke 5.15.0-1058.63\n linux-image-5.15.0-1058-kvm 5.15.0-1058.63\n linux-image-5.15.0-1059-gcp 5.15.0-1059.67\n linux-image-5.15.0-1059-oracle 5.15.0-1059.65\n linux-image-5.15.0-106-generic 5.15.0-106.116\n linux-image-5.15.0-106-generic-64k 5.15.0-106.116\n linux-image-5.15.0-106-generic-lpae 5.15.0-106.116\n linux-image-5.15.0-106-lowlatency 5.15.0-106.116\n linux-image-5.15.0-106-lowlatency-64k 5.15.0-106.116\n linux-image-5.15.0-1063-azure 5.15.0-1063.72\n linux-image-5.15.0-1063-azure-fde 5.15.0-1063.72.1\n linux-image-azure-fde-lts-22.04 5.15.0.1063.72.41\n linux-image-azure-lts-22.04 5.15.0.1063.61\n linux-image-gcp-lts-22.04 5.15.0.1059.55\n linux-image-generic 5.15.0.106.106\n linux-image-generic-64k 5.15.0.106.106\n linux-image-generic-lpae 5.15.0.106.106\n linux-image-gke 5.15.0.1058.57\n linux-image-gke-5.15 5.15.0.1058.57\n linux-image-gkeop 5.15.0.1044.43\n linux-image-gkeop-5.15 5.15.0.1044.43\n linux-image-ibm 5.15.0.1054.50\n linux-image-kvm 5.15.0.1058.54\n linux-image-lowlatency 5.15.0.106.101\n linux-image-lowlatency-64k 5.15.0.106.101\n linux-image-nvidia 5.15.0.1054.54\n linux-image-nvidia-lowlatency 5.15.0.1054.54\n linux-image-oracle-lts-22.04 5.15.0.1059.55\n linux-image-virtual 5.15.0.106.106\n\nUbuntu 20.04 LTS\n linux-image-5.15.0-1044-gkeop 5.15.0-1044.51~20.04.1\n linux-image-5.15.0-1054-ibm 5.15.0-1054.57~20.04.1\n linux-image-5.15.0-1059-gcp 5.15.0-1059.67~20.04.1\n linux-image-5.15.0-1059-oracle 5.15.0-1059.65~20.04.1\n linux-image-5.15.0-106-lowlatency 5.15.0-106.116~20.04.1\n linux-image-5.15.0-106-lowlatency-64k 5.15.0-106.116~20.04.1\n linux-image-5.15.0-1063-azure 5.15.0-1063.72~20.04.1\n linux-image-5.15.0-1063-azure-fde 5.15.0-1063.72~20.04.1.1\n linux-image-azure 5.15.0.1063.72~20.04.1\n linux-image-azure-cvm 5.15.0.1063.72~20.04.1\n linux-image-azure-fde 5.15.0.1063.72~20.04.1.41\n linux-image-gcp 5.15.0.1059.67~20.04.1\n linux-image-gkeop-5.15 5.15.0.1044.51~20.04.1\n linux-image-ibm 5.15.0.1054.57~20.04.1\n linux-image-lowlatency-64k-hwe-20.04 5.15.0.106.116~20.04.1\n linux-image-lowlatency-hwe-20.04 5.15.0.106.116~20.04.1\n linux-image-oracle 5.15.0.1059.65~20.04.1\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6766-1\n CVE-2023-52435, CVE-2023-52486, CVE-2023-52489, CVE-2023-52491,\n CVE-2023-52492, CVE-2023-52493, CVE-2023-52494, CVE-2023-52498,\n CVE-2023-52583, CVE-2023-52587, CVE-2023-52588, CVE-2023-52594,\n CVE-2023-52595, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599,\n CVE-2023-52601, CVE-2023-52602, CVE-2023-52604, CVE-2023-52606,\n CVE-2023-52607, CVE-2023-52608, CVE-2023-52614, CVE-2023-52615,\n CVE-2023-52616, CVE-2023-52617, CVE-2023-52618, CVE-2023-52619,\n CVE-2023-52622, CVE-2023-52623, CVE-2023-52627, CVE-2023-52631,\n CVE-2023-52633, CVE-2023-52635, CVE-2023-52637, CVE-2023-52638,\n CVE-2023-52642, CVE-2023-52643, CVE-2024-1151, CVE-2024-2201,\n CVE-2024-23849, CVE-2024-26592, CVE-2024-26593, CVE-2024-26594,\n CVE-2024-26600, CVE-2024-26602, CVE-2024-26606, CVE-2024-26608,\n CVE-2024-26610, CVE-2024-26614, CVE-2024-26615, CVE-2024-26625,\n CVE-2024-26627, CVE-2024-26635, CVE-2024-26636, CVE-2024-26640,\n CVE-2024-26641, CVE-2024-26644, CVE-2024-26645, CVE-2024-26660,\n CVE-2024-26663, CVE-2024-26664, CVE-2024-26665, CVE-2024-26668,\n CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26676,\n CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26689,\n CVE-2024-26695, CVE-2024-26696, CVE-2024-26697, CVE-2024-26698,\n CVE-2024-26702, CVE-2024-26704, CVE-2024-26707, CVE-2024-26712,\n CVE-2024-26715, CVE-2024-26717, CVE-2024-26720, CVE-2024-26722,\n CVE-2024-26808, CVE-2024-26825, CVE-2024-26826, CVE-2024-26829,\n CVE-2024-26910, CVE-2024-26916, CVE-2024-26920\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/5.15.0-106.116\n https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1063.72\n https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1063.72.1\n https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1059.67\n https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1058.63\n https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1044.51\n https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1054.57\n https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1058.63\n https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-106.116\n https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1054.55\n https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1059.65\n https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1063.72~20.04.1\n \nhttps://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1063.72~20.04.1.1\n https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1059.67~20.04.1\n https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1044.51~20.04.1\n https://launchpad.net/ubuntu/+source/linux-ibm-5.15/5.15.0-1054.57~20.04.1\n \nhttps://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-106.116~20.04.1\n \nhttps://launchpad.net/ubuntu/+source/linux-oracle-5.15/5.15.0-1059.65~20.04.1\n\n. \nThis update corrects flaws in the following subsystems:\n - Netfilter;\n(CVE-2024-26925, CVE-2024-26643)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.04 LTS\n linux-image-5.4.0-1039-iot 5.4.0-1039.40\n linux-image-5.4.0-1046-xilinx-zynqmp 5.4.0-1046.50\n linux-image-5.4.0-1074-ibm 5.4.0-1074.79\n linux-image-5.4.0-1087-bluefield 5.4.0-1087.94\n linux-image-5.4.0-1094-gkeop 5.4.0-1094.98\n linux-image-5.4.0-1111-raspi 5.4.0-1111.123\n linux-image-5.4.0-1115-kvm 5.4.0-1115.122\n linux-image-5.4.0-1126-oracle 5.4.0-1126.135\n linux-image-5.4.0-1127-aws 5.4.0-1127.137\n linux-image-5.4.0-1131-gcp 5.4.0-1131.140\n linux-image-5.4.0-1132-azure 5.4.0-1132.139\n linux-image-5.4.0-187-generic 5.4.0-187.207\n linux-image-5.4.0-187-generic-lpae 5.4.0-187.207\n linux-image-5.4.0-187-lowlatency 5.4.0-187.207\n linux-image-aws-lts-20.04 5.4.0.1127.124\n linux-image-azure-lts-20.04 5.4.0.1132.126\n linux-image-bluefield 5.4.0.1087.83\n linux-image-gcp-lts-20.04 5.4.0.1131.133\n linux-image-generic 5.4.0.187.185\n linux-image-generic-lpae 5.4.0.187.185\n linux-image-gkeop 5.4.0.1094.92\n linux-image-gkeop-5.4 5.4.0.1094.92\n linux-image-ibm-lts-20.04 5.4.0.1074.103\n linux-image-kvm 5.4.0.1115.111\n linux-image-lowlatency 5.4.0.187.185\n linux-image-oem 5.4.0.187.185\n linux-image-oem-osp1 5.4.0.187.185\n linux-image-oracle-lts-20.04 5.4.0.1126.119\n linux-image-raspi 5.4.0.1111.141\n linux-image-raspi2 5.4.0.1111.141\n linux-image-virtual 5.4.0.187.185\n linux-image-xilinx-zynqmp 5.4.0.1046.46\n\nUbuntu 18.04 LTS\n linux-image-5.4.0-1074-ibm 5.4.0-1074.79~18.04.1\n Available with Ubuntu Pro\n linux-image-5.4.0-1111-raspi 5.4.0-1111.123~18.04.1\n Available with Ubuntu Pro\n linux-image-5.4.0-1126-oracle 5.4.0-1126.135~18.04.1\n Available with Ubuntu Pro\n linux-image-5.4.0-1132-azure 5.4.0-1132.139~18.04.1\n Available with Ubuntu Pro\n linux-image-5.4.0-187-generic 5.4.0-187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-5.4.0-187-lowlatency 5.4.0-187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-azure 5.4.0.1132.139~18.04.1\n Available with Ubuntu Pro\n linux-image-generic-hwe-18.04 5.4.0.187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-ibm 5.4.0.1074.79~18.04.1\n Available with Ubuntu Pro\n linux-image-lowlatency-hwe-18.04 5.4.0.187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-oem 5.4.0.187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-oem-osp1 5.4.0.187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-oracle 5.4.0.1126.135~18.04.1\n Available with Ubuntu Pro\n linux-image-raspi-hwe-18.04 5.4.0.1111.123~18.04.1\n Available with Ubuntu Pro\n linux-image-snapdragon-hwe-18.04 5.4.0.187.207~18.04.1\n Available with Ubuntu Pro\n linux-image-virtual-hwe-18.04 5.4.0.187.207~18.04.1\n Available with Ubuntu Pro\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2022-0001" }, { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "VULHUB", "id": "VHN-404550" }, { "db": "VULMON", "id": "CVE-2022-0001" }, { "db": "PACKETSTORM", "id": "166243" }, { "db": "PACKETSTORM", "id": "166248" }, { "db": "PACKETSTORM", "id": "169340" }, { "db": "PACKETSTORM", "id": "178504" }, { "db": "PACKETSTORM", "id": "178614" }, { "db": "PACKETSTORM", "id": "178635" }, { "db": "PACKETSTORM", "id": "179349" }, { "db": "PACKETSTORM", "id": "179497" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-404550", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-404550" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-0001", "trust": 4.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2022/03/18/2", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#155143", "trust": 1.0 }, { "db": "PACKETSTORM", "id": "166248", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96610560", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU99752892", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-23-075-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001530", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "166569", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022030908", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022070643", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022031403", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022062931", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2855", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.3236", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0965", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0994", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1819", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1405", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1278", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.3136", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1277", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1857", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-79451", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202203-688", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "166243", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "166241", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-404550", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-0001", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169340", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "178504", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "178614", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "178635", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "179349", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "179497", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-404550" }, { "db": "VULMON", "id": "CVE-2022-0001" }, { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "PACKETSTORM", "id": "166243" }, { "db": "PACKETSTORM", "id": "166248" }, { "db": "PACKETSTORM", "id": "169340" }, { "db": "PACKETSTORM", "id": "178504" }, { "db": "PACKETSTORM", "id": "178614" }, { "db": "PACKETSTORM", "id": "178635" }, { "db": "PACKETSTORM", "id": "179349" }, { "db": "PACKETSTORM", "id": "179497" }, { "db": "CNNVD", "id": "CNNVD-202203-688" }, { "db": "NVD", "id": "CVE-2022-0001" } ] }, "id": "VAR-202203-0045", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-404550" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:11:59.404000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00598", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "title": "Linux kernel Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185188" }, { "title": "Red Hat: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2022-0001" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2022-0001" }, { "title": "Ubuntu Security Notice: USN-5318-1: Linux kernel vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-5318-1" }, { "title": "Ubuntu Security Notice: USN-5317-1: Linux kernel vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-5317-1" }, { "title": "Debian Security Advisories: DSA-5095-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=145808a324d7a624b8cc14cfceaae987" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-023", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2kernel-5.4-2022-023" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-011", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2kernel-5.10-2022-011" }, { "title": "Ubuntu Security Notice: USN-5362-1: Linux kernel (Intel IOTG) vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-5362-1" }, { "title": "Amazon Linux AMI: ALAS-2022-1571", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2022-1571" }, { "title": "Amazon Linux 2022: ALAS2022-2022-039", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=alas2022-2022-039" }, { "title": "Red Hat: Important: kernel security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20221988 - security advisory" }, { "title": "Amazon Linux 2: ALAS2-2022-1761", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2022-1761" }, { "title": "Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20224814 - security advisory" }, { "title": "Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20225483 - security advisory" }, { "title": "Red Hat: Important: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20224956 - security advisory" }, { "title": "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20225201 - security advisory" }, { "title": "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixes", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20225392 - security advisory" }, { "title": "Debian Security Advisories: DSA-5096-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=9382520336267e8dcd400d9d993e932b" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-0001 " }, { "title": "", "trust": 0.1, "url": "https://github.com/dadav/scf " }, { "title": "", "trust": 0.1, "url": "https://github.com/tsuki124/crawlab-sdk " }, { "title": "", "trust": 0.1, "url": "https://github.com/tsuki124/crawlab-db " }, { "title": "", "trust": 0.1, "url": "https://github.com/turbot/steampipe-plugin-trivy " }, { "title": "", "trust": 0.1, "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser " }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2022/03/15/spectre_bti_intel_amd_arm/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2022/03/09/microsoft_patch_tuesday/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-0001" }, { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "CNNVD", "id": "CNNVD-202203-688" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "NVD", "id": "CVE-2022-0001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.openwall.com/lists/oss-security/2022/03/18/2" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20220818-0004/" }, { "trust": 1.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "trust": 1.8, "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0001" }, { "trust": 1.0, "url": "https://www.kb.cert.org/vuls/id/155143" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96610560/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu99752892/index.html" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0994" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2855" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1278" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1277" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-0001/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022030908" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/166569/ubuntu-security-notice-usn-5362-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/166248/ubuntu-security-notice-usn-5319-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022062931" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1819" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022031403" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-79451" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1857" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0965" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1405" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.3136" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022070643" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.3236" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/intel-processor-information-disclosure-via-branch-predictor-selectors-37739" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52615" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52601" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-2201" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-5318-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25636" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0002" }, { "trust": 0.2, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/bhi" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52435" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52583" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-6766-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52616" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52617" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52595" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52587" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52493" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52607" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52597" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52606" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52492" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-6868-1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-0001" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-0001" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1067.71~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1058.61" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1072.75" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1017.19" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1036.37~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1066.71" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1017.19~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1065.68" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1072.75+cvm1.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1067.71" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23960" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1068.72~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1072.75~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1055.62" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1065.68~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.4.0-104.118" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1068.72" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-104.118~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1055.62~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1036.37" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1030.33" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1066.71~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1118.132" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5319-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1123.132" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1089.98" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1037.42" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1122.131" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1105.112" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-171.180" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1109.112" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1133.146" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0487" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36310" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0617" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-ibm-5.15/5.15.0-1054.57~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1044.51~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1059.67" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1058.63" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1063.72" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-106.116" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1063.72~20.04.1.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1063.72~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1058.63" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1054.55" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1059.67~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1054.57" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-106.116~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1059.65" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1063.72.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.15.0-106.116" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1044.51" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.15/5.15.0-1059.65~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-6.5/6.5.0-1020.20~22.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-starfive-6.5/6.5.0-1014.15~22.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-6774-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-laptop/6.5.0-1016.19" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe-6.5/6.5.0-35.35~22.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-47233" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/6.5.0-1020.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-6.5/6.5.0-1021.22~22.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-26614" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/6.5.0-1023.23" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/6.5.0-1017.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/6.5.0-1020.20" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-52602" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-26801" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-6.5/6.5.0-1023.23~22.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.5/6.5.0-35.35.1~22.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/6.5.0-35.35" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-starfive/6.5.0-1014.15" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-nvidia-6.5/6.5.0-1019.19" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/6.5.0-1021.22" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-26635" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-6.5/6.5.0-1020.20~22.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-lowlatency/6.5.0-35.35.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oem-6.5/6.5.0-1023.24" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1061.67~20.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-6766-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1061.67" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1126.135" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1087.94" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1111.123" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1132.139" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.4.0-1046.50" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.4.0-187.207" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1074.79" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1131.140" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1094.98" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-iot/5.4.0-1039.40" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1127.137" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1115.122" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-6868-2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-404550" }, { "db": "VULMON", "id": "CVE-2022-0001" }, { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "PACKETSTORM", "id": "166243" }, { "db": "PACKETSTORM", "id": "166248" }, { "db": "PACKETSTORM", "id": "169340" }, { "db": "PACKETSTORM", "id": "178504" }, { "db": "PACKETSTORM", "id": "178614" }, { "db": "PACKETSTORM", "id": "178635" }, { "db": "PACKETSTORM", "id": "179349" }, { "db": "PACKETSTORM", "id": "179497" }, { "db": "CNNVD", "id": "CNNVD-202203-688" }, { "db": "NVD", "id": "CVE-2022-0001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-404550" }, { "db": "VULMON", "id": "CVE-2022-0001" }, { "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "db": "PACKETSTORM", "id": "166243" }, { "db": "PACKETSTORM", "id": "166248" }, { "db": "PACKETSTORM", "id": "169340" }, { "db": "PACKETSTORM", "id": "178504" }, { "db": "PACKETSTORM", "id": "178614" }, { "db": "PACKETSTORM", "id": "178635" }, { "db": "PACKETSTORM", "id": "179349" }, { "db": "PACKETSTORM", "id": "179497" }, { "db": "CNNVD", "id": "CNNVD-202203-688" }, { "db": "NVD", "id": "CVE-2022-0001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-11T00:00:00", "db": "VULHUB", "id": "VHN-404550" }, { "date": "2022-03-11T00:00:00", "db": "VULMON", "id": "CVE-2022-0001" }, { "date": "2022-04-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "date": "2022-03-09T15:17:23", "db": "PACKETSTORM", "id": "166243" }, { "date": "2022-03-09T15:44:35", "db": "PACKETSTORM", "id": "166248" }, { "date": "2022-03-28T19:12:00", "db": "PACKETSTORM", "id": "169340" }, { "date": "2024-05-09T15:44:26", "db": "PACKETSTORM", "id": "178504" }, { "date": "2024-05-17T15:23:12", "db": "PACKETSTORM", "id": "178614" }, { "date": "2024-05-20T14:28:20", "db": "PACKETSTORM", "id": "178635" }, { "date": "2024-07-04T15:02:04", "db": "PACKETSTORM", "id": "179349" }, { "date": "2024-07-11T14:07:21", "db": "PACKETSTORM", "id": "179497" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-688" }, { "date": "2022-03-11T18:15:25.143000", "db": "NVD", "id": "CVE-2022-0001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-19T00:00:00", "db": "VULHUB", "id": "VHN-404550" }, { "date": "2022-08-19T00:00:00", "db": "VULMON", "id": "CVE-2022-0001" }, { "date": "2023-03-20T04:46:00", "db": "JVNDB", "id": "JVNDB-2022-001530" }, { "date": "2022-08-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-688" }, { "date": "2024-04-09T15:15:26.797000", "db": "NVD", "id": "CVE-2022-0001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "166243" }, { "db": "PACKETSTORM", "id": "166248" }, { "db": "PACKETSTORM", "id": "178504" }, { "db": "PACKETSTORM", "id": "178614" }, { "db": "PACKETSTORM", "id": "178635" }, { "db": "PACKETSTORM", "id": "179349" }, { "db": "PACKETSTORM", "id": "179497" }, { "db": "CNNVD", "id": "CNNVD-202203-688" } ], "trust": 1.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Intel(R)\u00a0Processor\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001530" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-688" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.