wid-sec-w-2022-0999
Vulnerability from csaf_certbund
Published
2020-11-10 23:00
Modified
2023-12-20 23:00
Summary
Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Prozessor ist das zentrale Rechenwerk eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
- Linux
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0999 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-0999.json" }, { "category": "self", "summary": "WID-SEC-2022-0999 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0999" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00381 vom 2020-11-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00389 vom 2020-11-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3276-1 vom 2020-11-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3275-1 vom 2020-11-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3274-1 vom 2020-11-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3271-1 vom 2020-11-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007750.html" }, { "category": "external", "summary": "Xen Security Advisory XSA-351 vom 2020-11-10", "url": "https://xenbits.xen.org/xsa/advisory-351.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5085 vom 2020-11-11", "url": "https://access.redhat.com/errata/RHSA-2020:5085" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5084 vom 2020-11-11", "url": "https://access.redhat.com/errata/RHSA-2020:5084" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5083 vom 2020-11-11", "url": "https://access.redhat.com/errata/RHSA-2020:5083" }, { "category": "external", "summary": "HP Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04057en_us" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04059en_us" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3279-1 vom 2020-11-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:14540-1 vom 2020-11-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5926 vom 2020-11-13", "url": "https://linux.oracle.com/errata/ELSA-2020-5926.html" }, { "category": "external", "summary": "Citrix Hypervisor Security Update", "url": "https://support.citrix.com/article/CTX285937" }, { "category": "external", "summary": "ORACLE OVMSA-2020-0049 vom 2020-11-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-November/001003.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5923 vom 2020-11-12", "url": "https://linux.oracle.com/errata/ELSA-2020-5923.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5924 vom 2020-11-12", "url": "https://linux.oracle.com/errata/ELSA-2020-5924.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3326-1 vom 2020-11-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3326-1 vom 2020-11-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007776.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5083 vom 2020-11-17", "url": "https://linux.oracle.com/errata/ELSA-2020-5083.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5084 vom 2020-11-17", "url": "https://linux.oracle.com/errata/ELSA-2020-5084.html" }, { "category": "external", "summary": "ORACLE OVMSA-2020-0051 vom 2020-11-17", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-November/001004.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5085 vom 2020-11-17", "url": "http://linux.oracle.com/errata/ELSA-2020-5085.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3416-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007811.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3415-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007810.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3412-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3414-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007813.html" }, { "category": "external", "summary": "Oracle VM Security Advisory OVMSA-2020-0053 vom 2020-11-19", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-November/001005.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3374-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:14546-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" }, { "category": "external", "summary": "ORACLE OVMSA-2020-0053 vom 2020-11-19", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-November/001005.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3413-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007815.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2020:5083 vom 2020-11-19", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-5083-Moderate-CentOS-7-microcode-ctl-Security-Update-tp4646074.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3372-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3373-1 vom 2020-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3457-1 vom 2020-11-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5185 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5185" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5186 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5186" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5184 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5184" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3484-1 vom 2020-11-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5189 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5189" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5190 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5188 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5188" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5181 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5181" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5182 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5182" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5183 vom 2020-11-23", "url": "https://access.redhat.com/errata/RHSA-2020:5183" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3501-1 vom 2020-11-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2020-D71FA5F0B9 vom 2020-11-25", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-d71fa5f0b9" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3503-1 vom 2020-11-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-185 vom 2020-11-24", "url": "https://downloads.avaya.com/css/P8/documents/101072516" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3512-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3513-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3522-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3514-1 vom 2020-11-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3544-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3544-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007878.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3532-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007874.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3532-1 vom 2020-11-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3615-1 vom 2020-12-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3612-1 vom 2020-12-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007910.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3611-1 vom 2020-12-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4804 vom 2020-12-05", "url": "https://www.debian.org/security/2020/dsa-4804" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5369 vom 2020-12-08", "url": "https://access.redhat.com/errata/RHSA-2020:5369" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3631-1 vom 2020-12-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3653-1 vom 2020-12-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3670-1 vom 2020-12-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3713-1 vom 2020-12-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:14557-1 vom 2020-12-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3715-1 vom 2020-12-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2483 vom 2020-12-10", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3742-1 vom 2020-12-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5996 vom 2020-12-15", "url": "http://linux.oracle.com/errata/ELSA-2020-5996.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2020-5995 vom 2020-12-15", "url": "http://linux.oracle.com/errata/ELSA-2020-5995.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2494 vom 2020-12-18", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9007 vom 2021-01-13", "url": "http://linux.oracle.com/errata/ELSA-2021-9007.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9008 vom 2021-01-12", "url": "https://linux.oracle.com/errata/ELSA-2021-9008.html" }, { "category": "external", "summary": "EMC Security Advisory DSA-2020-249 vom 2021-01-16", "url": "https://www.dell.com/support/kbdoc/en-us/000180498/dsa-2020-249-dell-client-platform-security-update-for-intel-platform-updates-2020-2-bios-november-2020" }, { "category": "external", "summary": "EMC Security Advisory DSA-2020-246 vom 2021-01-16", "url": "https://www.dell.com/support/kbdoc/en-us/000180484/dsa-2020-246-dell-emc-server-platform-security-advisory-for-the-monthly-2020-2-intel-platform-updates-nov-2020" }, { "category": "external", "summary": "Debian Security Advisory DLA-2546 vom 2021-02-05", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202102-34 vom 2021-02-27", "url": "https://security.archlinux.org/ASA-202102-34" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1023-1 vom 2021-04-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1460-1 vom 2021-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4628-1 vom 2021-05-17", "url": "https://ubuntu.com/security/notices/USN-4628-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1663 vom 2021-06-23", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1663.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3027 vom 2021-08-09", "url": "https://access.redhat.com/errata/RHSA-2021:3027" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3028 vom 2021-08-09", "url": "https://access.redhat.com/errata/RHSA-2021:3028" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3027 vom 2021-08-09", "url": "http://linux.oracle.com/errata/ELSA-2021-3027.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2021:3028 vom 2021-08-09", "url": "https://lists.centos.org/pipermail/centos-announce/2021-August/048347.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3028 vom 2021-08-09", "url": "http://linux.oracle.com/errata/ELSA-2021-3028.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3029 vom 2021-08-10", "url": "https://access.redhat.com/errata/RHSA-2021:3029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3176 vom 2021-08-17", "url": "https://access.redhat.com/errata/RHSA-2021:3176" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-105 vom 2021-08-19", "url": "https://downloads.avaya.com/css/P8/documents/101077166" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3255 vom 2021-08-25", "url": "https://access.redhat.com/errata/RHSA-2021:3255" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3322 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3322" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3317 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3317" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3323 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3323" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3364 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3364" }, { "category": "external", "summary": "ORACLE OVMSA-2022-0020 vom 2022-08-10", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2022-August/001056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4936-1 vom 2023-12-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" } ], "source_lang": "en-US", "title": "Intel Prozessoren: Mehrere Schwachstellen erm\u00f6glichen Offenlegung von Informationen", "tracking": { "current_release_date": "2023-12-20T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:55:20.040+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0999", "initial_release_date": "2020-11-10T23:00:00.000+00:00", "revision_history": [ { "date": "2020-11-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-11-11T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora und SUSE aufgenommen" }, { "date": "2020-11-12T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux, Citrix und ORACLE aufgenommen" }, { "date": "2020-11-15T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-16T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux und Oracle VM aufgenommen" }, { "date": "2020-11-17T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2020-11-19T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE, ORACLE und CentOS aufgenommen" }, { "date": "2020-11-22T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Fedora und SUSE aufgenommen" }, { "date": "2020-11-23T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2020-11-24T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE und Fedora aufgenommen" }, { "date": "2020-11-25T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von AVAYA und SUSE aufgenommen" }, { "date": "2020-11-26T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-12-03T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-12-06T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-12-07T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2020-12-08T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-12-10T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Debian und SUSE aufgenommen" }, { "date": "2020-12-14T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2020-12-20T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-01-12T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-01-17T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von EMC aufgenommen" }, { "date": "2021-02-07T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-02-28T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2021-04-06T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-05-02T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-05-16T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-06-23T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-08-08T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-09T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und CentOS aufgenommen" }, { "date": "2021-08-10T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-16T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-22T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-08-24T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-30T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2023-12-20T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "36" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Device Services", "product": { "name": "Avaya Aura Device Services", "product_id": "T015517", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_device_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Breeze Platform", "product": { "name": "Avaya Breeze Platform", "product_id": "T015823", "product_identification_helper": { "cpe": "cpe:/a:avaya:breeze_platform:-" } } }, { "category": "product_name", "name": "Avaya CMS", "product": { "name": "Avaya CMS", "product_id": "997", "product_identification_helper": { "cpe": "cpe:/a:avaya:call_management_system_server:-" } } }, { "category": "product_name", "name": "Avaya Session Border Controller", "product": { "name": "Avaya Session Border Controller", "product_id": "T015520", "product_identification_helper": { "cpe": "cpe:/h:avaya:session_border_controller:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Citrix Systems Hypervisor", "product": { "name": "Citrix Systems Hypervisor", "product_id": "T016872", "product_identification_helper": { "cpe": "cpe:/o:citrix:hypervisor:-" } } } ], "category": "vendor", "name": "Citrix Systems" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell BIOS", "product": { "name": "Dell BIOS", "product_id": "T005643", "product_identification_helper": { "cpe": "cpe:/h:dell:bios:latitude" } } }, { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Intel Prozessor", "product": { "name": "Intel Prozessor", "product_id": "T011586", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:-" } } } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source Xen", "product": { "name": "Open Source Xen", "product_id": "T000611", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28368", "notes": [ { "category": "description", "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Sie beruhen auf einer fehlerhaften Isolierung von geteilten Ressourcen, einer unzureichenden Entfernung von vertraulichen Daten vor einer Speicherung oder \u00dcbertragung, einer fehlerhaften Zugriffskontrolle im Linux Kernel Treiber und einer beobachtbaren Diskrepanz in der RAPL Schnittstelle. Ein Angreifer kann dieses nutzen und vertrauliche Daten einsehen." } ], "product_status": { "known_affected": [ "T006498", "T011119", "T015519", "T015518", "T015517", "67646", "T005643", "T015516", "T015823", "T013312", "T015127", "T011586", "T015126", "T004914", "T015520", "T016872", "2951", "T002207", "T000611", "T000126", "997", "398363", "1727", "T009310" ] }, "release_date": "2020-11-10T23:00:00Z", "title": "CVE-2020-28368" }, { "cve": "CVE-2020-8694", "notes": [ { "category": "description", "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Sie beruhen auf einer fehlerhaften Isolierung von geteilten Ressourcen, einer unzureichenden Entfernung von vertraulichen Daten vor einer Speicherung oder \u00dcbertragung, einer fehlerhaften Zugriffskontrolle im Linux Kernel Treiber und einer beobachtbaren Diskrepanz in der RAPL Schnittstelle. Ein Angreifer kann dieses nutzen und vertrauliche Daten einsehen." } ], "product_status": { "known_affected": [ "T006498", "T011119", "T015519", "T015518", "T015517", "67646", "T005643", "T015516", "T015823", "T013312", "T015127", "T011586", "T015126", "T004914", "T015520", "T016872", "2951", "T002207", "T000611", "T000126", "997", "398363", "1727", "T009310" ] }, "release_date": "2020-11-10T23:00:00Z", "title": "CVE-2020-8694" }, { "cve": "CVE-2020-8695", "notes": [ { "category": "description", "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Sie beruhen auf einer fehlerhaften Isolierung von geteilten Ressourcen, einer unzureichenden Entfernung von vertraulichen Daten vor einer Speicherung oder \u00dcbertragung, einer fehlerhaften Zugriffskontrolle im Linux Kernel Treiber und einer beobachtbaren Diskrepanz in der RAPL Schnittstelle. Ein Angreifer kann dieses nutzen und vertrauliche Daten einsehen." } ], "product_status": { "known_affected": [ "T006498", "T011119", "T015519", "T015518", "T015517", "67646", "T005643", "T015516", "T015823", "T013312", "T015127", "T011586", "T015126", "T004914", "T015520", "T016872", "2951", "T002207", "T000611", "T000126", "997", "398363", "1727", "T009310" ] }, "release_date": "2020-11-10T23:00:00Z", "title": "CVE-2020-8695" }, { "cve": "CVE-2020-8696", "notes": [ { "category": "description", "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Sie beruhen auf einer fehlerhaften Isolierung von geteilten Ressourcen, einer unzureichenden Entfernung von vertraulichen Daten vor einer Speicherung oder \u00dcbertragung, einer fehlerhaften Zugriffskontrolle im Linux Kernel Treiber und einer beobachtbaren Diskrepanz in der RAPL Schnittstelle. Ein Angreifer kann dieses nutzen und vertrauliche Daten einsehen." } ], "product_status": { "known_affected": [ "T006498", "T011119", "T015519", "T015518", "T015517", "67646", "T005643", "T015516", "T015823", "T013312", "T015127", "T011586", "T015126", "T004914", "T015520", "T016872", "2951", "T002207", "T000611", "T000126", "997", "398363", "1727", "T009310" ] }, "release_date": "2020-11-10T23:00:00Z", "title": "CVE-2020-8696" }, { "cve": "CVE-2020-8698", "notes": [ { "category": "description", "text": "In Intel Prozessoren existieren mehrere Schwachstellen. Sie beruhen auf einer fehlerhaften Isolierung von geteilten Ressourcen, einer unzureichenden Entfernung von vertraulichen Daten vor einer Speicherung oder \u00dcbertragung, einer fehlerhaften Zugriffskontrolle im Linux Kernel Treiber und einer beobachtbaren Diskrepanz in der RAPL Schnittstelle. Ein Angreifer kann dieses nutzen und vertrauliche Daten einsehen." } ], "product_status": { "known_affected": [ "T006498", "T011119", "T015519", "T015518", "T015517", "67646", "T005643", "T015516", "T015823", "T013312", "T015127", "T011586", "T015126", "T004914", "T015520", "T016872", "2951", "T002207", "T000611", "T000126", "997", "398363", "1727", "T009310" ] }, "release_date": "2020-11-10T23:00:00Z", "title": "CVE-2020-8698" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.