Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-0117 (GCVE-0-2019-0117)
Vulnerability from cvelistv5
- Information Disclosure
 
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | 2019.2 IPU – Intel(R) SGX with Intel(R) Processor Graphics Update | 
                    
                      
                        
                          Version: See provided reference | 
                  
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:14.434Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp%3Butm_medium=RSS"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "2019.2 IPU \u2013 Intel(R) SGX with Intel(R) Processor Graphics Update",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-21T09:06:58",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp%3Butm_medium=RSS"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-0117",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "2019.2 IPU \u2013 Intel(R) SGX with Intel(R) Processor Graphics Update",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
            },
            {
              "name": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-0117",
    "datePublished": "2019-11-14T19:08:20",
    "dateReserved": "2018-11-13T00:00:00",
    "dateUpdated": "2024-08-04T17:44:14.434Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-0117\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-11-14T20:15:11.227\",\"lastModified\":\"2024-11-21T04:16:15.730\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.\"},{\"lang\":\"es\",\"value\":\"Un control de acceso insuficiente en el subsistema de memoria protegida para Intel\u00ae SGX de 6th, 7th, 8th, 9th Generation Intel\u00ae Core(TM) Processor Families; Intel\u00ae Xeon\u00ae Processor E3-1500 v5, v6 Families; Procesador Intel\u00ae Xeon\u00ae E3-1500 v5, v6 Families; Intel\u00ae Xeon\u00ae E-2100 \u0026amp; E-2200 Processor Families con Intel\u00ae Processor Graphics, puede habilitar a un usuario privilegiado para permitir una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37ED0DB6-A589-4CB7-87AD-102FE7490AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD476-E402-408D-9BD6-886AB195704D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3EB3692-06DA-4EED-8F5E-D21ECC9EEDEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B1B04E8-A31F-4027-8E05-5461E7855F04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EE53DA-4639-4714-B956-CC69BBCC6D26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B5258B-26E4-4853-9F27-4BB12886CC38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86F4A2B-B4B4-42E2-8D5D-E31D06456C76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112701D9-7154-46E5-BF36-EE36A607C7DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237D4E3F-F132-4D6E-95F8-C607EC09CB50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F450DA-5FBA-47BB-9A7D-75873FB3E69F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6484B4DA-85FA-4BF9-9B4A-157BC2ED2889\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638549EC-1BB1-4206-B8DC-C0101BBEF8A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A91E832-9A60-4552-9388-DA779F9C4A9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C173CF7E-81DF-4AD5-AB17-A4C330B933D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34D8B71-549C-400A-976F-AA170F1D7B08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0BDFFB-638F-4FB7-A43A-812874D8774A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1912C4B-2371-463E-868C-3C35050E2A06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFC55E4-D84D-4588-976D-1E2637B1BF0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46994C87-8D86-4699-8257-DFAB90D08A09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBDCB2FA-B3D8-4922-B8B5-7FAA4A574D0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC1A189-D822-405B-A090-B1573FE12B14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE88726F-B548-4FF1-8E76-90DD6CFC12E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86FFF97C-C121-4F91-B62F-057356B0A048\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DD0B86-37A4-4927-97C5-86B165590105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C57E58-66E3-4FEC-A88F-B82C4B372B2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8851E2-CD05-4575-83E3-F801C1785A59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B09CA-91E9-4D11-AA11-B84F40495E9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB96985-BB1A-4F60-8259-E3AD4ACAD8CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3EA33F-D137-4B24-9211-C8A62A7427A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFAE743-376B-4FD1-8391-664D97667105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3DB891-40F6-4000-BEAE-A1710C70C43D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C00E0312-D1D1-410D-A3A1-74495AA1C2C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B79264-C756-408C-A32A-BFD4AA0B20CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CEC4C5-B559-4A48-A1D2-7CDB96381CCB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72467515-7793-479B-BABF-839275CA9AAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72876C5-C084-4DD3-9BC8-894C4BE40C15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5726D5D4-F188-4F06-B78A-2C7C694A40E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B450C9-CDC4-4047-AD77-19A4BC9CB870\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD248D-0B95-4BE1-917F-E0976447927D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3244927F-488B-4F7D-A616-02D26E64C88C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF705120-459D-49BA-BDCD-6AC38D95C820\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66430AA1-841C-4204-8846-B2FBEFF4269A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B91585C-4BD7-475B-8AC8-1B813A698D77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62D1D375-D4AE-4866-8472-30EBF2A6F057\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E1FB35-EB0D-46D9-8B07-5B74CD56B36C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3E6176-6F6D-4488-A03B-2BBF846ADC93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52E5B70-12E0-4AA2-81E5-71BBBFA1D500\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB1CF02E-EFEB-4841-9E57-27E6874A25F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D7B5DF-716F-48E6-9445-BB56A620DEF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2128AB8F-506E-4E75-AEBE-418EDFE083FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1BD53-55ED-4346-A67A-141B5BC552CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F70F59-FFE5-4A21-8299-B59C9FD2417B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EACCCA-7ADB-40B8-87DD-A55313E5BB97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CD5DEE-86B0-4431-A542-603300A28DB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173C6F98-4022-4F40-A39A-D3D490CA6461\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84928CAE-996F-42F9-8CB2-E3BC13E3D448\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A308E6AF-16CB-4722-8318-94F7B1877535\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA681B4-37F8-4E2E-B73B-E0E17C66B754\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB7E123-7871-4ED7-B76E-DC0151035B96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2425FF8A-158C-40EE-BDBF-43E7641BC058\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"828E6E11-A376-4F40-9077-81B9000B2692\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE85AE7-B4BD-442E-AFAB-CD01744C91B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419D32E2-D53C-4A81-8E9D-E79FD5D89B7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1737E9B0-D3DF-4B8A-8548-9B2CD94EB31F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF244D02-2B47-4884-8D70-37DFEB18CB60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"059D9645-5A07-44C5-A3B7-E8948D5F942A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA6BB38-CDF8-46B0-9910-897AB7920D18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"634087B5-A4D5-45AC-871F-7E785F48B9C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993BEE9-72BD-4615-B1BE-5E9129D61ABD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC557726-C2D4-4E95-AE20-85FE621586FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA675E6-83DD-47FF-BEBC-D32E5223A065\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45BC7EDA-83CD-488A-84B4-9B41B4780DE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A4E442-8E2C-472B-A9C6-56B58B6B55B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6572E2-5B24-4E21-9F6F-3A7A17A9F098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43695191-7897-4028-A8DA-F45D2B4E0C38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9862E49-124E-4B7D-941A-CFD2668B6481\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E88CE3A-812A-4C01-B0D7-D9A154FF2187\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA47107D-237A-4184-8BA2-601660F7FB5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C70D1724-ED58-4675-9A53-F7473D77638B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C1205B-6AC7-4DB5-B247-2108511D9957\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8BAD9D-7253-492A-87B3-CACCF66A332F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13E353-0063-468B-96CD-97BF91C747C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700__firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F633EA5-829B-4272-BA86-7A1DF479F207\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E3FC1B2-E1ED-4D00-8FE0-75295786817A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913BBEFF-49E7-42AF-A850-B49E5A12AB98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ABD229-0EF3-44AC-AD87-6C42EF48BF2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBFC1253-B337-4F9B-855D-14A3F6AE7EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE126ED-B743-4C6D-95FF-04F473A9A008\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61BD341-9D1F-444C-A5C9-761994866ED2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D57834B-C031-4301-9839-7A32F13687EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C3D738-944D-46A1-A542-32C96A021964\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20E7888-D3A3-4A01-8328-71A81AA0A52A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A97ED15-D0C6-4B64-BA08-EE50A6990272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45D72230-B7C2-4A9C-928F-328666CA3988\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D566CFB-935B-40E4-9F4E-6216A42E7EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16807D5E-1E13-4A98-8217-9AF6CE24A933\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C7AD56-CA31-4C08-A5C1-B50E767E1FFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54606FA5-02CE-43C5-9153-FB1070E9DD15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41EB643A-7C3B-4017-A12C-FB48A4F6D9EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF86B5D-4B93-4DFA-945E-723F49D90F1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DD3CCB-91D5-48D6-80BC-CA643385BCE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B60A1C2-D6E2-43B3-967C-746CDC2F96CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05EA3461-021B-42CD-B4BD-4D2E8703DB93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB14435-11E5-4F75-98BA-0A6D2E4818FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE776B91-9E25-48F5-A4F0-EB36B704AEBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53180F59-BE75-4A62-99ED-3602C025E388\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBB43D3B-BC91-46F1-840E-F6876095FAB9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B77426-B579-43C6-9340-F291138ECD7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08718840-D468-4E86-8FFF-A2B1841E6BF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9530B87C-B5C7-4EE6-BE29-A559BFE9EC18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9530B87C-B5C7-4EE6-BE29-A559BFE9EC18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88971837-5ED9-442C-BAF2-1C6C31105EB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E603DAD7-EC5F-42E9-B902-445599280DC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07279DDB-B07D-4224-AA1C-24B4F3D63BB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48293B3F-0DE7-4100-9512-2D20FC437D12\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8846D3C-39C6-48BE-9643-ACC479416257\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667DFE1-E66C-44BB-916F-0F1257B5289E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4440FC7-F90C-44E0-B7FB-C88BC95EAB77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26584C5B-4599-42CF-9C43-91A7B382756B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04076FFA-D74F-4501-9921-D8EBDF97CD20\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7\\\\+8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7\\\\+8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDCD661-394A-431F-84C2-0252ABD6F1B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942B77AD-CEA4-4A9F-B748-155916A4917A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1ED81E-3D62-47FB-8FD4-B2732525C33C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4EBD70-06C1-4842-AF3E-970218816B18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC82E058-25FE-4B6C-BA3C-AB043CFAB113\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E893B9-92D2-4EA9-BDC6-0E73CA4EE484\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE91A3E-B3EF-444F-A518-9027C1D65C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6774C8-431B-42AC-8955-02B529222372\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4E3B3E-5225-49ED-9159-4503DCDED473\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395788D-E23B-433A-B111-745C55018C68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2495E71F-8DE8-482E-A903-FA00E9A3C697\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A2FFBF5-FA4C-4213-BCBA-D129EC925466\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304CBDA-AF3E-4F32-BF45-FD2199D1E025\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD455EBB-69AE-464A-93AA-13227FBD17E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A2969-DC53-48E2-A5CA-4DF2B00D1960\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A727A1-219F-4B78-B490-0E47340B38F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659206BB-510A-47F8-8B6E-FD030A6BE1DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A8063AB-7D2C-4005-863F-A8BD612B430B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2ADBEF-CF97-410A-816B-F9D1E3BAF205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE70578-1EC4-4A02-95F7-5A23B76E1BEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5598510F-1057-4DB6-838C-8945FB6978DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA036BD6-38AF-4763-9B84-8CD7019BF262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3257F5-CA55-4F35-9D09-5B85253DE786\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D267F336-7023-4DA3-A481-0F6F8A44290C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581CCD85-F9BA-4AE0-8FCD-4118C13C1080\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C365D42-1DEA-4FF2-86E4-1CC27E52E40E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3625E5-4583-4F38-B6E3-68FD20E54ACB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB8CB49-D52E-4C92-9CD5-465615916213\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455BC769-5B19-4B91-844B-15B4FB2401E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CD303F-AAE9-4635-987D-742031232BDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867027D4-9EB4-4BAB-BDCC-FD43A087442F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FD2F07-6CD0-4708-8D11-3BA0AEFD5271\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419680D5-21E0-491C-98AA-9D079213A020\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF1493D-E866-4FA7-93A6-2461053A5C0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC758216-672D-4F7B-8CF3-6433B06AA2FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1163CF40-4D70-4965-8229-B102D754ECD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCE2EBC-82FE-49AB-857B-403C7ACE5091\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199A5D61-EB42-4C3C-9344-4CA497358D7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C289687E-4D0F-4F32-92A8-137B5D6AA3C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"662A5846-DA15-431B-9392-F0BA5457FDE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7CD68D-6177-4F61-ABAF-C88453BD6C52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E7038-2BFF-4372-8D28-2C72017EADB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D63DC7-0623-4777-86EC-06697FEBFD10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216DE05B-001E-47FE-B35A-55319B095853\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C0CFB-72A3-4446-9601-2C956C9A71F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A6C110-BE1A-4D3E-A048-D63F4F64B1E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADED698-2702-479C-A24E-E9E6F35E9AFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D19BB027-D927-4D06-A580-6C6E3E077B7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4426C-970C-49DB-950B-3F5ED17E682A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC32129-C5DC-4D26-96D5-219F5291D6F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA4F635-86BE-409A-A619-9EEA4C4B4FBA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6592D-743B-4656-B1C0-247F36ABE5CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F981A8EE-13BB-42C2-91D0-631247A03CB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CC9B92-CF59-4121-9638-F4D4521952D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A3CE35-5572-4355-B063-08DA49917126\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9490F926-AD57-40F3-A523-61D67486DCB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8F7DCA-3FA7-4943-9458-13695F529BBA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B5BF22-5E95-46A4-AF05-450CFD1312C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A77114-92C8-48C4-9D12-3ACC3030D5A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C619D6-6275-465E-9023-25EEFC298711\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057E3667-7BA8-4142-8A1E-B957333D776A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077BFDB3-CACE-4600-8ABE-DE079EDA8D6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A99895-6A48-4A44-B0F7-7BED55C677FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49E7867-14E6-4DB4-93D8-A108996F7B75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A10975-3375-4FB3-A008-56EB2ACD2737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8925FB8-D645-4DE0-A37A-4BCAEA1EBE08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CE1171D-9B4E-4134-8489-F44B2912E310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D7D164-E631-4D49-B87A-0B7885148790\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E61222-34B1-47AB-806F-DAAA4B41BD45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E257946A-458F-4F27-8387-9CF4DB8193FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE01A935-4048-4578-8FBA-1D12A95654D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5919FA36-0AB9-4D42-B33F-7795BD7601BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BD1F0B-7B75-4A5A-A708-BDE56D237354\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1746995D-CCA1-4858-87C5-8E2DC51FDA75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E0227B-8F2B-48B3-97BC-73BA1BACEED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7ABA76A-91AE-4524-9013-2BF843FFB5DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DB4F8D-E42C-4119-83BD-44D6AB9319B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47759461-35C3-4F77-9D96-B4929075CC17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC1EDA9-6CB8-4643-AC65-76B892319879\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3760BA20-5E0D-460C-BDD5-6E456646D814\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BCDBDF-A902-43A8-94A8-13541FB8CB32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"030F2C9A-E9F8-4B29-857A-B6A895C54A61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E629CF7-A706-4DD3-B3EB-A1F9711B0372\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5111864-B660-4603-BC03-94A719C8D2EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA12E60-4B0A-4723-8A02-3115494CD1DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE48BFF-CCB4-423D-968C-013060E447E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542BC61B-1EA3-4C42-BB99-C9C67EE82F7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C056C18D-457C-4216-8B91-84A4628DE44E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BF874F-B640-4A18-AC92-F0E16AB7E1C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1273C6-1F76-4366-88A2-A3955CB1CE3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF4F98-0672-4101-9825-57B0F64EDBEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9BABD0-E0D7-4D9D-B998-0FB23612E7BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2231374F-222A-4BA3-B14D-F69860668F7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F6A70D-4925-49A7-BFE9-A1B7F2CD6FF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2559D24-F8AD-4202-A00D-F48D51A0940A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32F3CD6-6BA6-40E7-9580-3C1A455B3C99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6185880A-E648-46C3-B14E-42DB61113C59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC9CEA2-C621-4DCF-B64C-5495D3208DB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65F8523D-BA5F-4BD8-A15F-A49B12001986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F2476F2-6A8B-442F-B054-738F36613CE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE98CB9-14D8-4297-807B-33F9B376D37B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333364EE-BF57-4217-9517-2C1B95B826CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B02BC8-A29C-48B9-B66C-2BD9C241DFD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5EFEF14-4ECB-45C9-8911-01FD7B115D7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3214D779-E335-4141-882F-CBB3A3317CDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C57129-0A27-4142-BF6E-68A558773573\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E031BE7-87C6-4E4B-8988-020221ECAEE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A393CA-35AB-4F8D-9A33-9693905DA445\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD11A3F-A2D4-4B09-84D2-548F97268805\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3540784A-1B0B-41EE-AB66-A293AC400C39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39616E34-9182-485B-B6AE-566DE2E77AA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C562AA0-3A76-4223-A5E4-13B2898FBC43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F68C14E0-5711-4D18-B529-AA0EE3BDC99C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFD79A0-2F24-484C-AD4A-D58B7414788E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE469B71-77FC-4940-AF10-631D73DEF18A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E6609BC-7E90-41F9-91A3-4139100D7A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98D6031F-201E-4FF2-A233-BF4C96ECF4B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF1AC701-DF74-457B-8CB6-FA35E0E78F29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC07C3B-8ECF-4BF1-A08D-907319EFFC34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EEEF17-0881-448C-A984-D5EFCB0F68EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A528C2-662C-40B1-8C71-A5A4134A6314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F222C991-CA9F-48FB-AC22-D8F6B837F8D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40D7630-3069-4AF7-B2B9-9AFF96A43AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DFA1D1-C133-4152-A66A-C70800905E17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9C4CE2-F65F-41FE-947C-16AD1558D03B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE808573-A9E6-4DFE-82E1-08546F5BF451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EB59BF-2708-4C3C-BA60-F621E067D824\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FAB23F-A289-42E6-BA8E-C4A061A9604C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4ABBE1-EE80-4FED-BBA7-A552BE31A826\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73DA92B-919E-4F75-A4A7-54E7F892BB24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1490C2DA-4627-4BAC-A505-E434A81FBDC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B263A8AF-03E7-4B05-888B-3395A2B10BF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1C21E5-81FF-45EE-836B-E809C8F34440\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7C6423-2E99-41D6-AD38-17658F1B1D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3540784A-1B0B-41EE-AB66-A293AC400C39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39616E34-9182-485B-B6AE-566DE2E77AA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C562AA0-3A76-4223-A5E4-13B2898FBC43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F68C14E0-5711-4D18-B529-AA0EE3BDC99C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFD79A0-2F24-484C-AD4A-D58B7414788E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE469B71-77FC-4940-AF10-631D73DEF18A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E6609BC-7E90-41F9-91A3-4139100D7A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98D6031F-201E-4FF2-A233-BF4C96ECF4B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF1AC701-DF74-457B-8CB6-FA35E0E78F29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC07C3B-8ECF-4BF1-A08D-907319EFFC34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EEEF17-0881-448C-A984-D5EFCB0F68EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A528C2-662C-40B1-8C71-A5A4134A6314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F222C991-CA9F-48FB-AC22-D8F6B837F8D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40D7630-3069-4AF7-B2B9-9AFF96A43AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DFA1D1-C133-4152-A66A-C70800905E17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9C4CE2-F65F-41FE-947C-16AD1558D03B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE808573-A9E6-4DFE-82E1-08546F5BF451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EB59BF-2708-4C3C-BA60-F621E067D824\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FAB23F-A289-42E6-BA8E-C4A061A9604C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4ABBE1-EE80-4FED-BBA7-A552BE31A826\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73DA92B-919E-4F75-A4A7-54E7F892BB24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1490C2DA-4627-4BAC-A505-E434A81FBDC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B263A8AF-03E7-4B05-888B-3395A2B10BF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1C21E5-81FF-45EE-836B-E809C8F34440\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7C6423-2E99-41D6-AD38-17658F1B1D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"}]}]}],\"references\":[{\"url\":\"https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}
  rhea-2019_3853
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1758570)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3853",
        "url": "https://access.redhat.com/errata/RHEA-2019:3853"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3853.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T14:00:10+00:00",
      "generator": {
        "date": "2024-11-22T14:00:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3853",
      "initial_release_date": "2019-11-12T22:47:29+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:47:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:47:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T14:00:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
                  "product_id": "6Server-6.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                  "product_id": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.23.el6_6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-19.23.el6_6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-19.23.el6_6.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-19.23.el6_6.src",
                  "product_id": "microcode_ctl-2:1.17-19.23.el6_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.23.el6_6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-19.23.el6_6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src"
        },
        "product_reference": "microcode_ctl-2:1.17-19.23.el6_6.src",
        "relates_to_product_reference": "6Server-6.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
        "relates_to_product_reference": "6Server-6.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
        "relates_to_product_reference": "6Server-6.6.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
          "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
          "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:47:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3853"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3851
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769884)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3851",
        "url": "https://access.redhat.com/errata/RHEA-2019:3851"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3851.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:54+00:00",
      "generator": {
        "date": "2024-11-22T13:59:54+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3851",
      "initial_release_date": "2019-11-12T23:04:46+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T23:04:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T23:04:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:54+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
                  "product_id": "7Server-7.3.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
                  "product_id": "7Server-7.3.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                  "product_id": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.27.el7_3?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-16.27.el7_3?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-16.27.el7_3.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-16.27.el7_3.src",
                  "product_id": "microcode_ctl-2:2.1-16.27.el7_3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.27.el7_3?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T23:04:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3851"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3847
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1755017)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3847",
        "url": "https://access.redhat.com/errata/RHEA-2019:3847"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3847.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T14:00:04+00:00",
      "generator": {
        "date": "2024-11-22T14:00:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3847",
      "initial_release_date": "2019-11-12T22:22:23+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:22:23+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:22:23+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T14:00:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=i686\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.19.el6_10?arch=i686\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.19.el6_10?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.src",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-6.10.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:22:23+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3847"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3848
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.6 Exteded Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769888)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3848",
        "url": "https://access.redhat.com/errata/RHEA-2019:3848"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3848.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:01+00:00",
      "generator": {
        "date": "2025-10-09T18:56:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3848",
      "initial_release_date": "2019-11-12T22:13:51+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:13:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:13:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
                  "product_id": "7ComputeNode-7.6.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
                  "product_id": "7Server-7.6.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                  "product_id": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.8.el7_6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-47.8.el7_6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-47.8.el7_6.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-47.8.el7_6.src",
                  "product_id": "microcode_ctl-2:2.1-47.8.el7_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.8.el7_6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.src",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.src",
        "relates_to_product_reference": "7Server-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7Server-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7Server-7.6.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
          "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
          "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
          "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
          "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
          "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:13:51+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3848"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3854
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112. (BZ#1760913)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3854",
        "url": "https://access.redhat.com/errata/RHEA-2019:3854"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3854.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T14:00:17+00:00",
      "generator": {
        "date": "2024-11-22T14:00:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3854",
      "initial_release_date": "2019-11-12T22:35:15+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:35:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:35:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T14:00:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
                  "product_id": "6Server-6.5.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                  "product_id": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.25.el6_5?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-17.25.el6_5?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-17.25.el6_5.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-17.25.el6_5.src",
                  "product_id": "microcode_ctl-2:1.17-17.25.el6_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.25.el6_5?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-17.25.el6_5.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src"
        },
        "product_reference": "microcode_ctl-2:1.17-17.25.el6_5.src",
        "relates_to_product_reference": "6Server-6.5.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
        "relates_to_product_reference": "6Server-6.5.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
        "relates_to_product_reference": "6Server-6.5.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
          "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
          "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:35:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3854"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3847
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1755017)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3847",
        "url": "https://access.redhat.com/errata/RHEA-2019:3847"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3847.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:00+00:00",
      "generator": {
        "date": "2025-10-09T18:56:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3847",
      "initial_release_date": "2019-11-12T22:22:23+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:22:23+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:22:23+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=i686\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.19.el6_10?arch=i686\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.19.el6_10?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.src",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-6.10.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:22:23+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3847"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3854
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112. (BZ#1760913)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3854",
        "url": "https://access.redhat.com/errata/RHEA-2019:3854"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3854.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:11+00:00",
      "generator": {
        "date": "2025-10-09T18:56:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3854",
      "initial_release_date": "2019-11-12T22:35:15+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:35:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:35:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
                  "product_id": "6Server-6.5.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                  "product_id": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.25.el6_5?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-17.25.el6_5?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-17.25.el6_5.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-17.25.el6_5.src",
                  "product_id": "microcode_ctl-2:1.17-17.25.el6_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.25.el6_5?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-17.25.el6_5.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src"
        },
        "product_reference": "microcode_ctl-2:1.17-17.25.el6_5.src",
        "relates_to_product_reference": "6Server-6.5.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
        "relates_to_product_reference": "6Server-6.5.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
        "relates_to_product_reference": "6Server-6.5.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
          "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
          "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:35:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3854"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3849
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769886)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3849",
        "url": "https://access.redhat.com/errata/RHEA-2019:3849"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3849.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:43+00:00",
      "generator": {
        "date": "2024-11-22T13:59:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3849",
      "initial_release_date": "2019-11-12T22:29:41+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:29:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:29:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
                  "product_id": "7ComputeNode-7.5.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
                  "product_id": "7Server-7.5.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                  "product_id": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.24.el7_5?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-29.24.el7_5?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-29.24.el7_5.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-29.24.el7_5.src",
                  "product_id": "microcode_ctl-2:2.1-29.24.el7_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.24.el7_5?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.src",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.src",
        "relates_to_product_reference": "7Server-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7Server-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7Server-7.5.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
          "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
          "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
          "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
          "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
          "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:29:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3849"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2020_0635
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nWith this update, the Intel microcode version has been updated to microcode-20191112.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2020:0635",
        "url": "https://access.redhat.com/errata/RHEA-2020:0635"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_0635.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:31+00:00",
      "generator": {
        "date": "2024-11-22T13:59:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2020:0635",
      "initial_release_date": "2020-02-27T15:27:50+00:00",
      "revision_history": [
        {
          "date": "2020-02-27T15:27:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-27T15:27:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
                  "product_id": "BaseOS-8.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                "product": {
                  "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                  "product_id": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20191112.1.el8_0?arch=x86_64\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                "product": {
                  "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                  "product_id": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20191112.1.el8_0?arch=src\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
          "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src"
        },
        "product_reference": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
        "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
          "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        },
        "product_reference": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
        "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-27T15:27:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2020:0635"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3848
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.6 Exteded Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769888)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3848",
        "url": "https://access.redhat.com/errata/RHEA-2019:3848"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3848.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:37+00:00",
      "generator": {
        "date": "2024-11-22T13:59:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3848",
      "initial_release_date": "2019-11-12T22:13:51+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:13:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:13:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
                  "product_id": "7ComputeNode-7.6.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
                  "product_id": "7Server-7.6.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                  "product_id": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.8.el7_6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-47.8.el7_6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-47.8.el7_6.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-47.8.el7_6.src",
                  "product_id": "microcode_ctl-2:2.1-47.8.el7_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.8.el7_6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.src",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.src",
        "relates_to_product_reference": "7Server-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7Server-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7Server-7.6.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
          "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
          "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
          "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
          "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
          "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:13:51+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3848"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3847
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1755017)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3847",
        "url": "https://access.redhat.com/errata/RHEA-2019:3847"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3847.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:00+00:00",
      "generator": {
        "date": "2025-10-09T18:56:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3847",
      "initial_release_date": "2019-11-12T22:22:23+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:22:23+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:22:23+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.10.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=i686\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.19.el6_10?arch=i686\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.19.el6_10?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-33.19.el6_10.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-33.19.el6_10.src",
                  "product_id": "microcode_ctl-2:1.17-33.19.el6_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.19.el6_10?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Client-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Server-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.src",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
        "relates_to_product_reference": "6Workstation-6.10.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
        "relates_to_product_reference": "6Workstation-6.10.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
          "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
          "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
          "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:22:23+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3847"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Client-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Server-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.src",
            "6Workstation-6.10.z:microcode_ctl-2:1.17-33.19.el6_10.x86_64",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.i686",
            "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.19.el6_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3850
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769885)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3850",
        "url": "https://access.redhat.com/errata/RHEA-2019:3850"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3850.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:49+00:00",
      "generator": {
        "date": "2024-11-22T13:59:49+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3850",
      "initial_release_date": "2019-11-12T22:27:53+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:27:53+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:27:53+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:49+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
                  "product_id": "7Server-7.4.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
                  "product_id": "7Server-7.4.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                  "product_id": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.26.el7_4?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-22.26.el7_4?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-22.26.el7_4.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-22.26.el7_4.src",
                  "product_id": "microcode_ctl-2:2.1-22.26.el7_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.26.el7_4?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:27:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3850"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3850
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769885)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3850",
        "url": "https://access.redhat.com/errata/RHEA-2019:3850"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3850.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:03+00:00",
      "generator": {
        "date": "2025-10-09T18:56:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3850",
      "initial_release_date": "2019-11-12T22:27:53+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:27:53+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:27:53+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
                  "product_id": "7Server-7.4.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
                  "product_id": "7Server-7.4.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                  "product_id": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.26.el7_4?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-22.26.el7_4?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-22.26.el7_4.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-22.26.el7_4.src",
                  "product_id": "microcode_ctl-2:2.1-22.26.el7_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.26.el7_4?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:27:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3850"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3851
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769884)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3851",
        "url": "https://access.redhat.com/errata/RHEA-2019:3851"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3851.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:09+00:00",
      "generator": {
        "date": "2025-10-09T18:56:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3851",
      "initial_release_date": "2019-11-12T23:04:46+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T23:04:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T23:04:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
                  "product_id": "7Server-7.3.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
                  "product_id": "7Server-7.3.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                  "product_id": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.27.el7_3?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-16.27.el7_3?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-16.27.el7_3.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-16.27.el7_3.src",
                  "product_id": "microcode_ctl-2:2.1-16.27.el7_3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.27.el7_3?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T23:04:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3851"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3846
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769889)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3846",
        "url": "https://access.redhat.com/errata/RHEA-2019:3846"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "external",
        "summary": "1753062",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
      },
      {
        "category": "external",
        "summary": "1753064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753064"
      },
      {
        "category": "external",
        "summary": "1753065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753065"
      },
      {
        "category": "external",
        "summary": "1753066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753066"
      },
      {
        "category": "external",
        "summary": "1753068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753068"
      },
      {
        "category": "external",
        "summary": "1753113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753113"
      },
      {
        "category": "external",
        "summary": "1758414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
      },
      {
        "category": "external",
        "summary": "1760200",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760200"
      },
      {
        "category": "external",
        "summary": "1765481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3846.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:55:58+00:00",
      "generator": {
        "date": "2025-10-09T18:55:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3846",
      "initial_release_date": "2019-11-12T22:46:28+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:46:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:46:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:55:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                  "product_id": "7ComputeNode-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                  "product_id": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.3.el7_7?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-53.3.el7_7?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-53.3.el7_7.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-53.3.el7_7.src",
                  "product_id": "microcode_ctl-2:2.1-53.3.el7_7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.3.el7_7?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:46:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3846"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3845
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nWith this update, the Intel microcode version has been updated to microcode-20191112.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3845",
        "url": "https://access.redhat.com/errata/RHEA-2019:3845"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "external",
        "summary": "1753062",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
      },
      {
        "category": "external",
        "summary": "1753064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753064"
      },
      {
        "category": "external",
        "summary": "1753065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753065"
      },
      {
        "category": "external",
        "summary": "1753066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753066"
      },
      {
        "category": "external",
        "summary": "1753068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753068"
      },
      {
        "category": "external",
        "summary": "1753113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753113"
      },
      {
        "category": "external",
        "summary": "1758414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
      },
      {
        "category": "external",
        "summary": "1760200",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760200"
      },
      {
        "category": "external",
        "summary": "1765481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3845.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:24+00:00",
      "generator": {
        "date": "2024-11-22T13:59:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3845",
      "initial_release_date": "2019-11-12T22:17:24+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:17:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:17:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                "product": {
                  "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                  "product_id": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20191112.1.el8_1?arch=x86_64\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                "product": {
                  "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                  "product_id": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20191112.1.el8_1?arch=src\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src"
        },
        "product_reference": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        },
        "product_reference": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:17:24+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3845"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3852
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769883)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3852",
        "url": "https://access.redhat.com/errata/RHEA-2019:3852"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3852.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:07+00:00",
      "generator": {
        "date": "2025-10-09T18:56:07+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3852",
      "initial_release_date": "2019-11-12T22:45:00+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:45:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:45:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:07+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
                  "product_id": "7Server-7.2.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
                  "product_id": "7Server-7.2.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                  "product_id": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.24.el7_2?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-12.24.el7_2?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-12.24.el7_2.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-12.24.el7_2.src",
                  "product_id": "microcode_ctl-2:2.1-12.24.el7_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.24.el7_2?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:45:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3852"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019_3852
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769883)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3852",
        "url": "https://access.redhat.com/errata/RHEA-2019:3852"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3852.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:59+00:00",
      "generator": {
        "date": "2024-11-22T13:59:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3852",
      "initial_release_date": "2019-11-12T22:45:00+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:45:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:45:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
                  "product_id": "7Server-7.2.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
                  "product_id": "7Server-7.2.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                  "product_id": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.24.el7_2?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-12.24.el7_2?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-12.24.el7_2.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-12.24.el7_2.src",
                  "product_id": "microcode_ctl-2:2.1-12.24.el7_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.24.el7_2?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:45:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3852"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3845
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nWith this update, the Intel microcode version has been updated to microcode-20191112.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3845",
        "url": "https://access.redhat.com/errata/RHEA-2019:3845"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "external",
        "summary": "1753062",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
      },
      {
        "category": "external",
        "summary": "1753064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753064"
      },
      {
        "category": "external",
        "summary": "1753065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753065"
      },
      {
        "category": "external",
        "summary": "1753066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753066"
      },
      {
        "category": "external",
        "summary": "1753068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753068"
      },
      {
        "category": "external",
        "summary": "1753113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753113"
      },
      {
        "category": "external",
        "summary": "1758414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
      },
      {
        "category": "external",
        "summary": "1760200",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760200"
      },
      {
        "category": "external",
        "summary": "1765481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3845.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:55:57+00:00",
      "generator": {
        "date": "2025-10-09T18:55:57+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3845",
      "initial_release_date": "2019-11-12T22:17:24+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:17:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:17:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:55:57+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                "product": {
                  "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                  "product_id": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20191112.1.el8_1?arch=x86_64\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                "product": {
                  "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                  "product_id": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20191112.1.el8_1?arch=src\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src"
        },
        "product_reference": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        },
        "product_reference": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:17:24+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3845"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-11139",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "discovery_date": "2019-10-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1765481"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: voltage modulation technical advisory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "RHBZ#1765481",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11139",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:17:24+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3845"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: voltage modulation technical advisory"
    }
  ]
}
  rhea-2019:3848
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.6 Exteded Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769888)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3848",
        "url": "https://access.redhat.com/errata/RHEA-2019:3848"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3848.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:01+00:00",
      "generator": {
        "date": "2025-10-09T18:56:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3848",
      "initial_release_date": "2019-11-12T22:13:51+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:13:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:13:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
                  "product_id": "7ComputeNode-7.6.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
                  "product_id": "7Server-7.6.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                  "product_id": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.8.el7_6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-47.8.el7_6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-47.8.el7_6.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-47.8.el7_6.src",
                  "product_id": "microcode_ctl-2:2.1-47.8.el7_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.8.el7_6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.src",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
          "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.src",
        "relates_to_product_reference": "7Server-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7Server-7.6.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
          "product_id": "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
        "relates_to_product_reference": "7Server-7.6.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
          "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
          "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
          "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
          "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
          "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:13:51+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3848"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.src",
            "7Server-7.6.EUS:microcode_ctl-2:2.1-47.8.el7_6.x86_64",
            "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.8.el7_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3854
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112. (BZ#1760913)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3854",
        "url": "https://access.redhat.com/errata/RHEA-2019:3854"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3854.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:11+00:00",
      "generator": {
        "date": "2025-10-09T18:56:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3854",
      "initial_release_date": "2019-11-12T22:35:15+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:35:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:35:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
                  "product_id": "6Server-6.5.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                  "product_id": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.25.el6_5?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-17.25.el6_5?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-17.25.el6_5.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-17.25.el6_5.src",
                  "product_id": "microcode_ctl-2:1.17-17.25.el6_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.25.el6_5?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-17.25.el6_5.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src"
        },
        "product_reference": "microcode_ctl-2:1.17-17.25.el6_5.src",
        "relates_to_product_reference": "6Server-6.5.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-17.25.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-17.25.el6_5.x86_64",
        "relates_to_product_reference": "6Server-6.5.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
          "product_id": "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64",
        "relates_to_product_reference": "6Server-6.5.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
          "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
          "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:35:15+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3854"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.src",
            "6Server-6.5.AUS:microcode_ctl-2:1.17-17.25.el6_5.x86_64",
            "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.25.el6_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3845
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nWith this update, the Intel microcode version has been updated to microcode-20191112.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3845",
        "url": "https://access.redhat.com/errata/RHEA-2019:3845"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "external",
        "summary": "1753062",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
      },
      {
        "category": "external",
        "summary": "1753064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753064"
      },
      {
        "category": "external",
        "summary": "1753065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753065"
      },
      {
        "category": "external",
        "summary": "1753066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753066"
      },
      {
        "category": "external",
        "summary": "1753068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753068"
      },
      {
        "category": "external",
        "summary": "1753113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753113"
      },
      {
        "category": "external",
        "summary": "1758414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
      },
      {
        "category": "external",
        "summary": "1760200",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760200"
      },
      {
        "category": "external",
        "summary": "1765481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3845.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:55:57+00:00",
      "generator": {
        "date": "2025-10-09T18:55:57+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3845",
      "initial_release_date": "2019-11-12T22:17:24+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:17:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:17:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:55:57+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                "product": {
                  "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                  "product_id": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20191112.1.el8_1?arch=x86_64\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                "product": {
                  "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                  "product_id": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20191112.1.el8_1?arch=src\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src"
        },
        "product_reference": "microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        },
        "product_reference": "microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:17:24+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3845"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-11139",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "discovery_date": "2019-10-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1765481"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: voltage modulation technical advisory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
          "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "RHBZ#1765481",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11139",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:17:24+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3845"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.src",
            "BaseOS-8.1.0.Z.MAIN.EUS:microcode_ctl-4:20190618-1.20191112.1.el8_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: voltage modulation technical advisory"
    }
  ]
}
  rhea-2019:3846
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769889)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3846",
        "url": "https://access.redhat.com/errata/RHEA-2019:3846"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "external",
        "summary": "1753062",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
      },
      {
        "category": "external",
        "summary": "1753064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753064"
      },
      {
        "category": "external",
        "summary": "1753065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753065"
      },
      {
        "category": "external",
        "summary": "1753066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753066"
      },
      {
        "category": "external",
        "summary": "1753068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753068"
      },
      {
        "category": "external",
        "summary": "1753113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753113"
      },
      {
        "category": "external",
        "summary": "1758414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
      },
      {
        "category": "external",
        "summary": "1760200",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760200"
      },
      {
        "category": "external",
        "summary": "1765481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3846.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:55:58+00:00",
      "generator": {
        "date": "2025-10-09T18:55:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3846",
      "initial_release_date": "2019-11-12T22:46:28+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:46:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:46:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:55:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                  "product_id": "7ComputeNode-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                  "product_id": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.3.el7_7?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-53.3.el7_7?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-53.3.el7_7.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-53.3.el7_7.src",
                  "product_id": "microcode_ctl-2:2.1-53.3.el7_7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.3.el7_7?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:46:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3846"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3852
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769883)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3852",
        "url": "https://access.redhat.com/errata/RHEA-2019:3852"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3852.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:07+00:00",
      "generator": {
        "date": "2025-10-09T18:56:07+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3852",
      "initial_release_date": "2019-11-12T22:45:00+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:45:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:45:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:07+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
                  "product_id": "7Server-7.2.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
                  "product_id": "7Server-7.2.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
                  "product_id": "7Server-7.2.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                  "product_id": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.24.el7_2?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-12.24.el7_2?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-12.24.el7_2.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-12.24.el7_2.src",
                  "product_id": "microcode_ctl-2:2.1-12.24.el7_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.24.el7_2?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
          "product_id": "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
          "product_id": "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.src",
        "relates_to_product_reference": "7Server-7.2.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
          "product_id": "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
        "relates_to_product_reference": "7Server-7.2.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
          "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
          "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:45:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3852"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.AUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.E4S:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.E4S:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.src",
            "7Server-7.2.TUS:microcode_ctl-2:2.1-12.24.el7_2.x86_64",
            "7Server-7.2.TUS:microcode_ctl-debuginfo-2:2.1-12.24.el7_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3850
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769885)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3850",
        "url": "https://access.redhat.com/errata/RHEA-2019:3850"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3850.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:03+00:00",
      "generator": {
        "date": "2025-10-09T18:56:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3850",
      "initial_release_date": "2019-11-12T22:27:53+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:27:53+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:27:53+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
                  "product_id": "7Server-7.4.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
                  "product_id": "7Server-7.4.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                  "product_id": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.26.el7_4?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-22.26.el7_4?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-22.26.el7_4.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-22.26.el7_4.src",
                  "product_id": "microcode_ctl-2:2.1-22.26.el7_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.26.el7_4?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
          "product_id": "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.src",
        "relates_to_product_reference": "7Server-7.4.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
          "product_id": "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
        "relates_to_product_reference": "7Server-7.4.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
          "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
          "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:27:53+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3850"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.AUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.E4S:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.src",
            "7Server-7.4.TUS:microcode_ctl-2:2.1-22.26.el7_4.x86_64",
            "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.26.el7_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3849
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769886)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3849",
        "url": "https://access.redhat.com/errata/RHEA-2019:3849"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3849.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:02+00:00",
      "generator": {
        "date": "2025-10-09T18:56:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3849",
      "initial_release_date": "2019-11-12T22:29:41+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:29:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:29:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
                  "product_id": "7ComputeNode-7.5.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
                  "product_id": "7Server-7.5.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                  "product_id": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.24.el7_5?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-29.24.el7_5?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-29.24.el7_5.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-29.24.el7_5.src",
                  "product_id": "microcode_ctl-2:2.1-29.24.el7_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.24.el7_5?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.src",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.src",
        "relates_to_product_reference": "7Server-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7Server-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7Server-7.5.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
          "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
          "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
          "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
          "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
          "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:29:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3849"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2019:3853
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1758570)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3853",
        "url": "https://access.redhat.com/errata/RHEA-2019:3853"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3853.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:10+00:00",
      "generator": {
        "date": "2025-10-09T18:56:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3853",
      "initial_release_date": "2019-11-12T22:47:29+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:47:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:47:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
                  "product_id": "6Server-6.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                  "product_id": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.23.el6_6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-19.23.el6_6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-19.23.el6_6.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-19.23.el6_6.src",
                  "product_id": "microcode_ctl-2:1.17-19.23.el6_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.23.el6_6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-19.23.el6_6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src"
        },
        "product_reference": "microcode_ctl-2:1.17-19.23.el6_6.src",
        "relates_to_product_reference": "6Server-6.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
        "relates_to_product_reference": "6Server-6.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
        "relates_to_product_reference": "6Server-6.6.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
          "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
          "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:47:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3853"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3849
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769886)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3849",
        "url": "https://access.redhat.com/errata/RHEA-2019:3849"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3849.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:02+00:00",
      "generator": {
        "date": "2025-10-09T18:56:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3849",
      "initial_release_date": "2019-11-12T22:29:41+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:29:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:29:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
                  "product_id": "7ComputeNode-7.5.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
                  "product_id": "7Server-7.5.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                  "product_id": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.24.el7_5?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-29.24.el7_5?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-29.24.el7_5.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-29.24.el7_5.src",
                  "product_id": "microcode_ctl-2:2.1-29.24.el7_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-29.24.el7_5?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.src",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
          "product_id": "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.src",
        "relates_to_product_reference": "7Server-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7Server-7.5.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
          "product_id": "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
        "relates_to_product_reference": "7Server-7.5.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
          "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
          "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
          "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
          "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
          "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:29:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3849"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7ComputeNode-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7ComputeNode-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.src",
            "7Server-7.5.EUS:microcode_ctl-2:2.1-29.24.el7_5.x86_64",
            "7Server-7.5.EUS:microcode_ctl-debuginfo-2:2.1-29.24.el7_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3853
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1758570)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3853",
        "url": "https://access.redhat.com/errata/RHEA-2019:3853"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3853.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:10+00:00",
      "generator": {
        "date": "2025-10-09T18:56:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3853",
      "initial_release_date": "2019-11-12T22:47:29+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:47:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:47:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
                  "product_id": "6Server-6.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                "product": {
                  "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                  "product_id": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.23.el6_6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-19.23.el6_6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:1.17-19.23.el6_6.src",
                "product": {
                  "name": "microcode_ctl-2:1.17-19.23.el6_6.src",
                  "product_id": "microcode_ctl-2:1.17-19.23.el6_6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.23.el6_6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-19.23.el6_6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src"
        },
        "product_reference": "microcode_ctl-2:1.17-19.23.el6_6.src",
        "relates_to_product_reference": "6Server-6.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:1.17-19.23.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64"
        },
        "product_reference": "microcode_ctl-2:1.17-19.23.el6_6.x86_64",
        "relates_to_product_reference": "6Server-6.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
          "product_id": "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64",
        "relates_to_product_reference": "6Server-6.6.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
          "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
          "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:47:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3853"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.src",
            "6Server-6.6.AUS:microcode_ctl-2:1.17-19.23.el6_6.x86_64",
            "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.23.el6_6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  RHEA-2020:0635
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nWith this update, the Intel microcode version has been updated to microcode-20191112.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2020:0635",
        "url": "https://access.redhat.com/errata/RHEA-2020:0635"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_0635.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:13+00:00",
      "generator": {
        "date": "2025-10-09T18:56:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2020:0635",
      "initial_release_date": "2020-02-27T15:27:50+00:00",
      "revision_history": [
        {
          "date": "2020-02-27T15:27:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-27T15:27:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
                  "product_id": "BaseOS-8.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                "product": {
                  "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                  "product_id": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20191112.1.el8_0?arch=x86_64\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                "product": {
                  "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                  "product_id": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20191112.1.el8_0?arch=src\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
          "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src"
        },
        "product_reference": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
        "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
          "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        },
        "product_reference": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
        "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-27T15:27:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2020:0635"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-11139",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "discovery_date": "2019-10-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1765481"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: voltage modulation technical advisory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "RHBZ#1765481",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11139",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-27T15:27:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2020:0635"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: voltage modulation technical advisory"
    }
  ]
}
  rhea-2019_3846
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769889)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3846",
        "url": "https://access.redhat.com/errata/RHEA-2019:3846"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "external",
        "summary": "1753062",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
      },
      {
        "category": "external",
        "summary": "1753064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753064"
      },
      {
        "category": "external",
        "summary": "1753065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753065"
      },
      {
        "category": "external",
        "summary": "1753066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753066"
      },
      {
        "category": "external",
        "summary": "1753068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753068"
      },
      {
        "category": "external",
        "summary": "1753113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753113"
      },
      {
        "category": "external",
        "summary": "1758414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
      },
      {
        "category": "external",
        "summary": "1760200",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760200"
      },
      {
        "category": "external",
        "summary": "1765481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3846.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T13:59:30+00:00",
      "generator": {
        "date": "2024-11-22T13:59:30+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHEA-2019:3846",
      "initial_release_date": "2019-11-12T22:46:28+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T22:46:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T22:46:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:59:30+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
                  "product_id": "7ComputeNode-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                  "product_id": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.3.el7_7?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-53.3.el7_7?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-53.3.el7_7.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-53.3.el7_7.src",
                  "product_id": "microcode_ctl-2:2.1-53.3.el7_7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.3.el7_7?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Client-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
          "product_id": "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7ComputeNode-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Server-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.src",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
        "relates_to_product_reference": "7Workstation-7.7.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
          "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
          "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
          "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T22:46:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3846"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Client-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Client-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7ComputeNode-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7ComputeNode-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Server-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Server-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.src",
            "7Workstation-7.7.Z:microcode_ctl-2:2.1-53.3.el7_7.x86_64",
            "7Workstation-7.7.Z:microcode_ctl-debuginfo-2:2.1-53.3.el7_7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2019:3851
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nThis update adds the following enhancement:\n\n* Update Intel microcode version to microcode-20191112 (BZ#1769884)\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2019:3851",
        "url": "https://access.redhat.com/errata/RHEA-2019:3851"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3851.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:09+00:00",
      "generator": {
        "date": "2025-10-09T18:56:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2019:3851",
      "initial_release_date": "2019-11-12T23:04:46+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T23:04:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-12T23:04:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
                  "product_id": "7Server-7.3.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
                  "product_id": "7Server-7.3.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                "product": {
                  "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                  "product_id": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.27.el7_3?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                "product": {
                  "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                  "product_id": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-16.27.el7_3?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-2:2.1-16.27.el7_3.src",
                "product": {
                  "name": "microcode_ctl-2:2.1-16.27.el7_3.src",
                  "product_id": "microcode_ctl-2:2.1-16.27.el7_3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.27.el7_3?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
          "product_id": "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.src",
        "relates_to_product_reference": "7Server-7.3.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
          "product_id": "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        },
        "product_reference": "microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
        "relates_to_product_reference": "7Server-7.3.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
          "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
          "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-12T23:04:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2019:3851"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.AUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.E4S:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.src",
            "7Server-7.3.TUS:microcode_ctl-2:2.1-16.27.el7_3.x86_64",
            "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.27.el7_3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    }
  ]
}
  rhea-2020:0635
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The microcode_ctl packages provide microcode updates for Intel x86 processors.\n\nWith this update, the Intel microcode version has been updated to microcode-20191112.\n\nUsers of microcode_ctl are advised to upgrade to these updated packages, which\nadd this enhancement.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHEA-2020:0635",
        "url": "https://access.redhat.com/errata/RHEA-2020:0635"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
        "url": "https://access.redhat.com/solutions/2019-microcode-nov"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_0635.json"
      }
    ],
    "title": "Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-09T18:56:13+00:00",
      "generator": {
        "date": "2025-10-09T18:56:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHEA-2020:0635",
      "initial_release_date": "2020-02-27T15:27:50+00:00",
      "revision_history": [
        {
          "date": "2020-02-27T15:27:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-27T15:27:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T18:56:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
                  "product_id": "BaseOS-8.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                "product": {
                  "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                  "product_id": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20191112.1.el8_0?arch=x86_64\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                "product": {
                  "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                  "product_id": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20191112.1.el8_0?arch=src\u0026epoch=4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
          "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src"
        },
        "product_reference": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
        "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
          "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        },
        "product_reference": "microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64",
        "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-0117",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1758414"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the implementation of SGX around the access control of protected memory. This flaw allows a local attacker of a system with SGX enabled and an affected intel GPU with the ability to execute code to interpret the contents of the SGX protected memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: Intel SGX information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "RHBZ#1758414",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758414"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0117",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-27T15:27:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2020:0635"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "hw: Intel SGX information leak"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2019-11139",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "discovery_date": "2019-10-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1765481"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: voltage modulation technical advisory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
          "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "RHBZ#1765481",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765481"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11139",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11139"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/solutions/2019-microcode-nov",
          "url": "https://access.redhat.com/solutions/2019-microcode-nov"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
        }
      ],
      "release_date": "2019-11-12T18:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-27T15:27:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nNote: a system reboot is necessary for this update to take effect.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHEA-2020:0635"
        },
        {
          "category": "workaround",
          "details": "As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.",
          "product_ids": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.src",
            "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20191112.1.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: voltage modulation technical advisory"
    }
  ]
}
  wid-sec-w-2023-1689
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-1689 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-1689 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
        "url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
        "url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
      },
      {
        "category": "external",
        "summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
        "url": "https://xenbits.xen.org/xsa/advisory-305.html"
      },
      {
        "category": "external",
        "summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
        "url": "https://xenbits.xen.org/xsa/advisory-304.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3832"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3833"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3834"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3835"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3837"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3838"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3839"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3840"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3842"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3844"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3860"
      },
      {
        "category": "external",
        "summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
      },
      {
        "category": "external",
        "summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
      },
      {
        "category": "external",
        "summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4187-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4188-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4186-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4185-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4184-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4183-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4182-2/"
      },
      {
        "category": "external",
        "summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
        "url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
      },
      {
        "category": "external",
        "summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
        "url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
      },
      {
        "category": "external",
        "summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
        "url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
      },
      {
        "category": "external",
        "summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
        "url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4186-3/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3873"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3872"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3877"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3878"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3872"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4184-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4183-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4185-3/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3883"
      },
      {
        "category": "external",
        "summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
        "url": "https://security.archlinux.org/ASA-201911-14"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3870"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3871"
      },
      {
        "category": "external",
        "summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
        "url": "https://support.citrix.com/article/CTX263684"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K32412503 vom 2019-11-15",
        "url": "https://support.f5.com/csp/article/K32412503"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
      },
      {
        "category": "external",
        "summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3887"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3889"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
        "url": "https://downloads.avaya.com/css/P8/documents/101062296"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
        "url": "https://downloads.avaya.com/css/P8/documents/101062297"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2019:3908"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2019:3916"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
        "url": "https://downloads.avaya.com/css/P8/documents/101062452"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
        "url": "https://downloads.avaya.com/css/P8/documents/101062451"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2019:3936"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
        "url": "https://access.redhat.com/errata/RHSA-2019:3941"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
        "url": "https://usn.ubuntu.com/4182-4/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
        "url": "https://usn.ubuntu.com/4182-3/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K54164678 vom 2019-12-27",
        "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
        "url": "https://access.redhat.com/errata/RHSA-2020:0026"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
        "url": "https://access.redhat.com/errata/RHSA-2020:0028"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2020:0204"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory",
        "url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
        "url": "https://access.redhat.com/errata/RHSA-2020:0279"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0328"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0366"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0339"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
        "url": "https://access.redhat.com/errata/RHSA-2020:0555"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
        "url": "https://access.redhat.com/errata/RHSA-2020:0666"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2020:0730"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
        "url": "https://access.redhat.com/errata/RHSA-2020:0839"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
        "url": "https://access.redhat.com/errata/RHSA-2020:0834"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
        "url": "https://downloads.avaya.com/css/P8/documents/101065862"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
        "url": "https://access.redhat.com/errata/RHSA-2020:1465"
      },
      {
        "category": "external",
        "summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
      },
      {
        "category": "external",
        "summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
      },
      {
        "category": "external",
        "summary": "EMC Security Advisory 538629 vom 2020-06-22",
        "url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
        "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
      },
      {
        "category": "external",
        "summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
        "url": "http://security.libvirt.org/2019/0008.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K17269881 vom 2020-08-26",
        "url": "https://support.f5.com/csp/article/K17269881"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
        "url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Intel Prozessoren: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-31T22:00:00.000+00:00",
      "generator": {
        "date": "2025-09-01T07:26:11.338+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2023-1689",
      "initial_release_date": "2019-11-12T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2019-11-13T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
        },
        {
          "date": "2019-11-13T23:00:00.000+00:00",
          "number": "3",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-13T23:00:00.000+00:00",
          "number": "4",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-14T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
        },
        {
          "date": "2019-11-17T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE und AVAYA aufgenommen"
        },
        {
          "date": "2019-11-18T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2019-11-18T23:00:00.000+00:00",
          "number": "8",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-19T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2019-11-20T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
        },
        {
          "date": "2019-11-20T23:00:00.000+00:00",
          "number": "11",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-21T23:00:00.000+00:00",
          "number": "12",
          "summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
        },
        {
          "date": "2019-11-28T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-02T23:00:00.000+00:00",
          "number": "14",
          "summary": "Schreibfehler korrigiert"
        },
        {
          "date": "2019-12-03T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2019-12-08T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-12T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-15T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-17T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-19T23:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-22T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-29T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2020-01-01T23:00:00.000+00:00",
          "number": "23",
          "summary": "Referenz(en) aufgenommen: DLA 2051"
        },
        {
          "date": "2020-01-06T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-01-14T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-01-22T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-01-26T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2020-01-29T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-02-03T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-02-04T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-02-06T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-02-19T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-03T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-05T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-17T23:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-25T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2020-04-13T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2020-04-14T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-05-05T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von HPE"
        },
        {
          "date": "2020-06-21T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von EMC aufgenommen"
        },
        {
          "date": "2020-06-22T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2020-07-08T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von Juniper aufgenommen"
        },
        {
          "date": "2020-07-13T22:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2020-07-27T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von libvirt aufgenommen"
        },
        {
          "date": "2020-08-25T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2020-09-06T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-11-16T23:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-07-09T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-12T23:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-08-18T22:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-19T22:00:00.000+00:00",
          "number": "51",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-24T22:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-27T22:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-28T22:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-31T22:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von SUSE aufgenommen"
        }
      ],
      "status": "final",
      "version": "55"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Communication Manager",
            "product": {
              "name": "Avaya Aura Communication Manager",
              "product_id": "T015126",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:communication_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Session Manager",
            "product": {
              "name": "Avaya Aura Session Manager",
              "product_id": "T015127",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:session_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura System Manager",
            "product": {
              "name": "Avaya Aura System Manager",
              "product_id": "T015518",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_system_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Media Gateway",
            "product": {
              "name": "Avaya Media Gateway",
              "product_id": "T015276",
              "product_identification_helper": {
                "cpe": "cpe:/h:avaya:media_gateway:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Web License Manager",
            "product": {
              "name": "Avaya Web License Manager",
              "product_id": "T016243",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:web_license_manager:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Citrix Systems XenServer",
            "product": {
              "name": "Citrix Systems XenServer",
              "product_id": "T004077",
              "product_identification_helper": {
                "cpe": "cpe:/a:citrix:xenserver:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Citrix Systems"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Dell Computer",
            "product": {
              "name": "Dell Computer",
              "product_id": "T006498",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:dell_computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "F5 BIG-IP",
            "product": {
              "name": "F5 BIG-IP",
              "product_id": "T001663",
              "product_identification_helper": {
                "cpe": "cpe:/a:f5:big-ip:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "FreeBSD Project FreeBSD OS",
            "product": {
              "name": "FreeBSD Project FreeBSD OS",
              "product_id": "4035",
              "product_identification_helper": {
                "cpe": "cpe:/o:freebsd:freebsd:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "FreeBSD Project"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HP BIOS",
            "product": {
              "name": "HP BIOS",
              "product_id": "T007117",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:bios:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HP"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE ProLiant",
            "product": {
              "name": "HPE ProLiant",
              "product_id": "T009310",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:proliant:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel AMT SDK",
            "product": {
              "name": "Intel AMT SDK",
              "product_id": "T011597",
              "product_identification_helper": {
                "cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Intel Prozessor",
            "product": {
              "name": "Intel Prozessor",
              "product_id": "T011586",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:intel_prozessor:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Intel Xeon",
            "product": {
              "name": "Intel Xeon",
              "product_id": "T011286",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:xeon:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c20.1R1",
                "product": {
                  "name": "Juniper Junos Space \u003c20.1R1",
                  "product_id": "T016874"
                }
              },
              {
                "category": "product_version",
                "name": "20.1R1",
                "product": {
                  "name": "Juniper Junos Space 20.1R1",
                  "product_id": "T016874-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:juniper:junos_space:20.1r1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Junos Space"
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp Data ONTAP",
            "product": {
              "name": "NetApp Data ONTAP",
              "product_id": "7654",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:data_ontap:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "NetApp FAS",
            "product": {
              "name": "NetApp FAS",
              "product_id": "T011540",
              "product_identification_helper": {
                "cpe": "cpe:/h:netapp:fas:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Arch Linux",
            "product": {
              "name": "Open Source Arch Linux",
              "product_id": "T013312",
              "product_identification_helper": {
                "cpe": "cpe:/o:archlinux:archlinux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Xen",
            "product": {
              "name": "Open Source Xen",
              "product_id": "T000611",
              "product_identification_helper": {
                "cpe": "cpe:/o:xen:xen:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c6.0.0",
                "product": {
                  "name": "Open Source libvirt \u003c6.0.0",
                  "product_id": "712004"
                }
              },
              {
                "category": "product_version",
                "name": "6.0.0",
                "product": {
                  "name": "Open Source libvirt 6.0.0",
                  "product_id": "712004-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:libvirt:6.0.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libvirt"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Oracle VM",
            "product": {
              "name": "Oracle VM",
              "product_id": "T011119",
              "product_identification_helper": {
                "cpe": "cpe:/a:oracle:vm:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS",
                  "product_id": "T015361",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "category": "product_name",
            "name": "Red Hat Enterprise MRG",
            "product": {
              "name": "Red Hat Enterprise MRG",
              "product_id": "T003513",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:enterprise_mrg:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Fedora",
            "product": {
              "name": "Red Hat Fedora",
              "product_id": "T007849",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "VMware ESXi",
            "product": {
              "name": "VMware ESXi",
              "product_id": "T009575",
              "product_identification_helper": {
                "cpe": "cpe:/o:vmware:esxi:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "VMware Fusion",
            "product": {
              "name": "VMware Fusion",
              "product_id": "T009574",
              "product_identification_helper": {
                "cpe": "cpe:/a:vmware:fusion:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "VMware Workstation",
            "product": {
              "name": "VMware Workstation",
              "product_id": "11768",
              "product_identification_helper": {
                "cpe": "cpe:/a:vmware:workstation:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "VMware"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel System Management Software",
            "product": {
              "name": "Intel System Management Software",
              "product_id": "T014240",
              "product_identification_helper": {
                "cpe": "cpe:/a:intel:system_management_software:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "intel"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-12207",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2018-12207"
    },
    {
      "cve": "CVE-2019-0117",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0117"
    },
    {
      "cve": "CVE-2019-0123",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0123"
    },
    {
      "cve": "CVE-2019-0124",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0124"
    },
    {
      "cve": "CVE-2019-0131",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0131"
    },
    {
      "cve": "CVE-2019-0151",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0151"
    },
    {
      "cve": "CVE-2019-0152",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0152"
    },
    {
      "cve": "CVE-2019-0154",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0154"
    },
    {
      "cve": "CVE-2019-0155",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0155"
    },
    {
      "cve": "CVE-2019-0165",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0165"
    },
    {
      "cve": "CVE-2019-0166",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0166"
    },
    {
      "cve": "CVE-2019-0168",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0168"
    },
    {
      "cve": "CVE-2019-0169",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0169"
    },
    {
      "cve": "CVE-2019-0184",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0184"
    },
    {
      "cve": "CVE-2019-0185",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0185"
    },
    {
      "cve": "CVE-2019-11086",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11086"
    },
    {
      "cve": "CVE-2019-11087",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11087"
    },
    {
      "cve": "CVE-2019-11088",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11088"
    },
    {
      "cve": "CVE-2019-11089",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11089"
    },
    {
      "cve": "CVE-2019-11090",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11090"
    },
    {
      "cve": "CVE-2019-11097",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11097"
    },
    {
      "cve": "CVE-2019-11100",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11100"
    },
    {
      "cve": "CVE-2019-11101",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11101"
    },
    {
      "cve": "CVE-2019-11102",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11102"
    },
    {
      "cve": "CVE-2019-11103",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11103"
    },
    {
      "cve": "CVE-2019-11104",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11104"
    },
    {
      "cve": "CVE-2019-11105",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11105"
    },
    {
      "cve": "CVE-2019-11106",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11106"
    },
    {
      "cve": "CVE-2019-11107",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11107"
    },
    {
      "cve": "CVE-2019-11108",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11108"
    },
    {
      "cve": "CVE-2019-11109",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11109"
    },
    {
      "cve": "CVE-2019-11110",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11110"
    },
    {
      "cve": "CVE-2019-11111",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11111"
    },
    {
      "cve": "CVE-2019-11112",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11112"
    },
    {
      "cve": "CVE-2019-11113",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11113"
    },
    {
      "cve": "CVE-2019-11131",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11131"
    },
    {
      "cve": "CVE-2019-11132",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11132"
    },
    {
      "cve": "CVE-2019-11135",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11135"
    },
    {
      "cve": "CVE-2019-11136",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11136"
    },
    {
      "cve": "CVE-2019-11137",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11137"
    },
    {
      "cve": "CVE-2019-11139",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11139"
    },
    {
      "cve": "CVE-2019-11147",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11147"
    },
    {
      "cve": "CVE-2019-14574",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-14574"
    },
    {
      "cve": "CVE-2019-14590",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-14590"
    },
    {
      "cve": "CVE-2019-14591",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-14591"
    }
  ]
}
  WID-SEC-W-2023-1689
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-1689 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-1689 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
        "url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
        "url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
      },
      {
        "category": "external",
        "summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
        "url": "https://xenbits.xen.org/xsa/advisory-305.html"
      },
      {
        "category": "external",
        "summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
        "url": "https://xenbits.xen.org/xsa/advisory-304.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3832"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3833"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3834"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3835"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3837"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3838"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3839"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3840"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3842"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3844"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2019:3860"
      },
      {
        "category": "external",
        "summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
      },
      {
        "category": "external",
        "summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
      },
      {
        "category": "external",
        "summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
        "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4187-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4188-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4186-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4185-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4184-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4183-1/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
        "url": "https://usn.ubuntu.com/4182-2/"
      },
      {
        "category": "external",
        "summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
        "url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
      },
      {
        "category": "external",
        "summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
        "url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
      },
      {
        "category": "external",
        "summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
        "url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
      },
      {
        "category": "external",
        "summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
        "url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4186-3/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3873"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3872"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3877"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3878"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3872"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4184-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4183-2/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
        "url": "https://usn.ubuntu.com/4185-3/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3883"
      },
      {
        "category": "external",
        "summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
        "url": "https://security.archlinux.org/ASA-201911-14"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3870"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
        "url": "https://access.redhat.com/errata/RHSA-2019:3871"
      },
      {
        "category": "external",
        "summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
        "url": "https://support.citrix.com/article/CTX263684"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K32412503 vom 2019-11-15",
        "url": "https://support.f5.com/csp/article/K32412503"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
      },
      {
        "category": "external",
        "summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3887"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
        "url": "https://access.redhat.com/errata/RHSA-2019:3889"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
        "url": "https://downloads.avaya.com/css/P8/documents/101062296"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
        "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
        "url": "https://downloads.avaya.com/css/P8/documents/101062297"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2019:3908"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2019:3916"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
        "url": "https://downloads.avaya.com/css/P8/documents/101062452"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
        "url": "https://downloads.avaya.com/css/P8/documents/101062451"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2019:3936"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
        "url": "https://access.redhat.com/errata/RHSA-2019:3941"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
        "url": "https://usn.ubuntu.com/4182-4/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
        "url": "https://usn.ubuntu.com/4182-3/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K54164678 vom 2019-12-27",
        "url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
        "url": "https://access.redhat.com/errata/RHSA-2020:0026"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
        "url": "https://access.redhat.com/errata/RHSA-2020:0028"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2020:0204"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory",
        "url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
        "url": "https://access.redhat.com/errata/RHSA-2020:0279"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0328"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0366"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0339"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
        "url": "https://access.redhat.com/errata/RHSA-2020:0555"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
        "url": "https://access.redhat.com/errata/RHSA-2020:0666"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2020:0730"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
        "url": "https://access.redhat.com/errata/RHSA-2020:0839"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
        "url": "https://access.redhat.com/errata/RHSA-2020:0834"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
        "url": "https://downloads.avaya.com/css/P8/documents/101065862"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
        "url": "https://access.redhat.com/errata/RHSA-2020:1465"
      },
      {
        "category": "external",
        "summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
      },
      {
        "category": "external",
        "summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
      },
      {
        "category": "external",
        "summary": "EMC Security Advisory 538629 vom 2020-06-22",
        "url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
        "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
      },
      {
        "category": "external",
        "summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
        "url": "http://security.libvirt.org/2019/0008.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K17269881 vom 2020-08-26",
        "url": "https://support.f5.com/csp/article/K17269881"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
        "url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
        "url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Intel Prozessoren: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-31T22:00:00.000+00:00",
      "generator": {
        "date": "2025-09-01T07:26:11.338+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2023-1689",
      "initial_release_date": "2019-11-12T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2019-11-12T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2019-11-13T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
        },
        {
          "date": "2019-11-13T23:00:00.000+00:00",
          "number": "3",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-13T23:00:00.000+00:00",
          "number": "4",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-14T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
        },
        {
          "date": "2019-11-17T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE und AVAYA aufgenommen"
        },
        {
          "date": "2019-11-18T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2019-11-18T23:00:00.000+00:00",
          "number": "8",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-19T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2019-11-20T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
        },
        {
          "date": "2019-11-20T23:00:00.000+00:00",
          "number": "11",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2019-11-21T23:00:00.000+00:00",
          "number": "12",
          "summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
        },
        {
          "date": "2019-11-28T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-02T23:00:00.000+00:00",
          "number": "14",
          "summary": "Schreibfehler korrigiert"
        },
        {
          "date": "2019-12-03T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2019-12-08T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-12T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-15T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-17T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-19T23:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-22T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-12-29T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2020-01-01T23:00:00.000+00:00",
          "number": "23",
          "summary": "Referenz(en) aufgenommen: DLA 2051"
        },
        {
          "date": "2020-01-06T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-01-14T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-01-22T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-01-26T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2020-01-29T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-02-03T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-02-04T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-02-06T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-02-19T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-03T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-05T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-17T23:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-25T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2020-04-13T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von AVAYA aufgenommen"
        },
        {
          "date": "2020-04-14T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-05-05T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von HPE"
        },
        {
          "date": "2020-06-21T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von EMC aufgenommen"
        },
        {
          "date": "2020-06-22T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2020-07-08T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von Juniper aufgenommen"
        },
        {
          "date": "2020-07-13T22:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2020-07-27T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von libvirt aufgenommen"
        },
        {
          "date": "2020-08-25T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2020-09-06T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-11-16T23:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-07-09T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-12T23:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-08-18T22:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-19T22:00:00.000+00:00",
          "number": "51",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-24T22:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-27T22:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-28T22:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-31T22:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von SUSE aufgenommen"
        }
      ],
      "status": "final",
      "version": "55"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Communication Manager",
            "product": {
              "name": "Avaya Aura Communication Manager",
              "product_id": "T015126",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:communication_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Session Manager",
            "product": {
              "name": "Avaya Aura Session Manager",
              "product_id": "T015127",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:session_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura System Manager",
            "product": {
              "name": "Avaya Aura System Manager",
              "product_id": "T015518",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_system_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Media Gateway",
            "product": {
              "name": "Avaya Media Gateway",
              "product_id": "T015276",
              "product_identification_helper": {
                "cpe": "cpe:/h:avaya:media_gateway:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Web License Manager",
            "product": {
              "name": "Avaya Web License Manager",
              "product_id": "T016243",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:web_license_manager:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Citrix Systems XenServer",
            "product": {
              "name": "Citrix Systems XenServer",
              "product_id": "T004077",
              "product_identification_helper": {
                "cpe": "cpe:/a:citrix:xenserver:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Citrix Systems"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Dell Computer",
            "product": {
              "name": "Dell Computer",
              "product_id": "T006498",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:dell_computer:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "F5 BIG-IP",
            "product": {
              "name": "F5 BIG-IP",
              "product_id": "T001663",
              "product_identification_helper": {
                "cpe": "cpe:/a:f5:big-ip:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "FreeBSD Project FreeBSD OS",
            "product": {
              "name": "FreeBSD Project FreeBSD OS",
              "product_id": "4035",
              "product_identification_helper": {
                "cpe": "cpe:/o:freebsd:freebsd:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "FreeBSD Project"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HP BIOS",
            "product": {
              "name": "HP BIOS",
              "product_id": "T007117",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:bios:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HP"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HPE ProLiant",
            "product": {
              "name": "HPE ProLiant",
              "product_id": "T009310",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:proliant:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel AMT SDK",
            "product": {
              "name": "Intel AMT SDK",
              "product_id": "T011597",
              "product_identification_helper": {
                "cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Intel Prozessor",
            "product": {
              "name": "Intel Prozessor",
              "product_id": "T011586",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:intel_prozessor:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Intel Xeon",
            "product": {
              "name": "Intel Xeon",
              "product_id": "T011286",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:xeon:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c20.1R1",
                "product": {
                  "name": "Juniper Junos Space \u003c20.1R1",
                  "product_id": "T016874"
                }
              },
              {
                "category": "product_version",
                "name": "20.1R1",
                "product": {
                  "name": "Juniper Junos Space 20.1R1",
                  "product_id": "T016874-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:juniper:junos_space:20.1r1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Junos Space"
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp Data ONTAP",
            "product": {
              "name": "NetApp Data ONTAP",
              "product_id": "7654",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:data_ontap:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "NetApp FAS",
            "product": {
              "name": "NetApp FAS",
              "product_id": "T011540",
              "product_identification_helper": {
                "cpe": "cpe:/h:netapp:fas:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Arch Linux",
            "product": {
              "name": "Open Source Arch Linux",
              "product_id": "T013312",
              "product_identification_helper": {
                "cpe": "cpe:/o:archlinux:archlinux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source Xen",
            "product": {
              "name": "Open Source Xen",
              "product_id": "T000611",
              "product_identification_helper": {
                "cpe": "cpe:/o:xen:xen:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c6.0.0",
                "product": {
                  "name": "Open Source libvirt \u003c6.0.0",
                  "product_id": "712004"
                }
              },
              {
                "category": "product_version",
                "name": "6.0.0",
                "product": {
                  "name": "Open Source libvirt 6.0.0",
                  "product_id": "712004-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:libvirt:6.0.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libvirt"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Oracle VM",
            "product": {
              "name": "Oracle VM",
              "product_id": "T011119",
              "product_identification_helper": {
                "cpe": "cpe:/a:oracle:vm:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS",
                  "product_id": "T015361",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "category": "product_name",
            "name": "Red Hat Enterprise MRG",
            "product": {
              "name": "Red Hat Enterprise MRG",
              "product_id": "T003513",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:enterprise_mrg:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Fedora",
            "product": {
              "name": "Red Hat Fedora",
              "product_id": "T007849",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "VMware ESXi",
            "product": {
              "name": "VMware ESXi",
              "product_id": "T009575",
              "product_identification_helper": {
                "cpe": "cpe:/o:vmware:esxi:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "VMware Fusion",
            "product": {
              "name": "VMware Fusion",
              "product_id": "T009574",
              "product_identification_helper": {
                "cpe": "cpe:/a:vmware:fusion:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "VMware Workstation",
            "product": {
              "name": "VMware Workstation",
              "product_id": "11768",
              "product_identification_helper": {
                "cpe": "cpe:/a:vmware:workstation:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "VMware"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel System Management Software",
            "product": {
              "name": "Intel System Management Software",
              "product_id": "T014240",
              "product_identification_helper": {
                "cpe": "cpe:/a:intel:system_management_software:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "intel"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-12207",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2018-12207"
    },
    {
      "cve": "CVE-2019-0117",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0117"
    },
    {
      "cve": "CVE-2019-0123",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0123"
    },
    {
      "cve": "CVE-2019-0124",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0124"
    },
    {
      "cve": "CVE-2019-0131",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0131"
    },
    {
      "cve": "CVE-2019-0151",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0151"
    },
    {
      "cve": "CVE-2019-0152",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0152"
    },
    {
      "cve": "CVE-2019-0154",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0154"
    },
    {
      "cve": "CVE-2019-0155",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0155"
    },
    {
      "cve": "CVE-2019-0165",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0165"
    },
    {
      "cve": "CVE-2019-0166",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0166"
    },
    {
      "cve": "CVE-2019-0168",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0168"
    },
    {
      "cve": "CVE-2019-0169",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0169"
    },
    {
      "cve": "CVE-2019-0184",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0184"
    },
    {
      "cve": "CVE-2019-0185",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-0185"
    },
    {
      "cve": "CVE-2019-11086",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11086"
    },
    {
      "cve": "CVE-2019-11087",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11087"
    },
    {
      "cve": "CVE-2019-11088",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11088"
    },
    {
      "cve": "CVE-2019-11089",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11089"
    },
    {
      "cve": "CVE-2019-11090",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11090"
    },
    {
      "cve": "CVE-2019-11097",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11097"
    },
    {
      "cve": "CVE-2019-11100",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11100"
    },
    {
      "cve": "CVE-2019-11101",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11101"
    },
    {
      "cve": "CVE-2019-11102",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11102"
    },
    {
      "cve": "CVE-2019-11103",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11103"
    },
    {
      "cve": "CVE-2019-11104",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11104"
    },
    {
      "cve": "CVE-2019-11105",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11105"
    },
    {
      "cve": "CVE-2019-11106",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11106"
    },
    {
      "cve": "CVE-2019-11107",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11107"
    },
    {
      "cve": "CVE-2019-11108",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11108"
    },
    {
      "cve": "CVE-2019-11109",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11109"
    },
    {
      "cve": "CVE-2019-11110",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11110"
    },
    {
      "cve": "CVE-2019-11111",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11111"
    },
    {
      "cve": "CVE-2019-11112",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11112"
    },
    {
      "cve": "CVE-2019-11113",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11113"
    },
    {
      "cve": "CVE-2019-11131",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11131"
    },
    {
      "cve": "CVE-2019-11132",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11132"
    },
    {
      "cve": "CVE-2019-11135",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11135"
    },
    {
      "cve": "CVE-2019-11136",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11136"
    },
    {
      "cve": "CVE-2019-11137",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11137"
    },
    {
      "cve": "CVE-2019-11139",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11139"
    },
    {
      "cve": "CVE-2019-11147",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-11147"
    },
    {
      "cve": "CVE-2019-14574",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-14574"
    },
    {
      "cve": "CVE-2019-14590",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-14590"
    },
    {
      "cve": "CVE-2019-14591",
      "product_status": {
        "known_affected": [
          "T004077",
          "T006498",
          "67646",
          "4035",
          "T007849",
          "T011540",
          "T011286",
          "T015127",
          "T011586",
          "T015126",
          "T016874",
          "T004914",
          "11768",
          "T015361",
          "T000611",
          "T001663",
          "T011119",
          "T015518",
          "T007117",
          "7654",
          "T003513",
          "T013312",
          "T011597",
          "T015276",
          "T016243",
          "T014240",
          "2951",
          "T002207",
          "T000126",
          "712004",
          "1727",
          "T009575",
          "T009310",
          "T009574"
        ]
      },
      "release_date": "2019-11-12T23:00:00.000+00:00",
      "title": "CVE-2019-14591"
    }
  ]
}
  gsd-2019-0117
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2019-0117",
    "description": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.",
    "id": "GSD-2019-0117",
    "references": [
      "https://www.suse.com/security/cve/CVE-2019-0117.html",
      "https://access.redhat.com/errata/RHEA-2020:0635",
      "https://access.redhat.com/errata/RHEA-2019:3854",
      "https://access.redhat.com/errata/RHEA-2019:3853",
      "https://access.redhat.com/errata/RHEA-2019:3852",
      "https://access.redhat.com/errata/RHEA-2019:3851",
      "https://access.redhat.com/errata/RHEA-2019:3850",
      "https://access.redhat.com/errata/RHEA-2019:3849",
      "https://access.redhat.com/errata/RHEA-2019:3848",
      "https://access.redhat.com/errata/RHEA-2019:3847",
      "https://access.redhat.com/errata/RHEA-2019:3846",
      "https://access.redhat.com/errata/RHEA-2019:3845",
      "https://advisories.mageia.org/CVE-2019-0117.html",
      "https://security.archlinux.org/CVE-2019-0117"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2019-0117"
      ],
      "details": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.",
      "id": "GSD-2019-0117",
      "modified": "2023-12-13T01:23:39.732310Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secure@intel.com",
        "ID": "CVE-2019-0117",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "2019.2 IPU \u2013 Intel(R) SGX with Intel(R) Processor Graphics Update",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "See provided reference"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Information Disclosure"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
            "refsource": "MISC",
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
          },
          {
            "name": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS",
            "refsource": "CONFIRM",
            "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7700__firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700_:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-0117"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-noinfo"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html",
              "refsource": "MISC",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
            },
            {
              "name": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "LOW",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "exploitabilityScore": 0.8,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2020-08-24T17:37Z",
      "publishedDate": "2019-11-14T20:15Z"
    }
  }
}
  fkie_cve-2019-0117
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://support.f5.com/csp/article/K73837233?utm_source=f5support&%3Butm_medium=RSS | ||
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K73837233?utm_source=f5support&%3Butm_medium=RSS | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html | Vendor Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| intel | core_i7-6970hq_firmware | - | |
| intel | core_i7-6970hq | - | |
| intel | core_i7-6920hq_firmware | - | |
| intel | core_i7-6920hq | - | |
| intel | core_i7-6870hq_firmware | - | |
| intel | core_i7-6870hq | - | |
| intel | core_i7-6822eq_firmware | - | |
| intel | core_i7-6822eq | - | |
| intel | core_i7-6820hq_firmware | - | |
| intel | core_i7-6820hq | - | |
| intel | core_i7-6820hk_firmware | - | |
| intel | core_i7-6820hk | - | |
| intel | core_i7-6820eq_firmware | - | |
| intel | core_i7-6820eq | - | |
| intel | core_i7-6785r_firmware | - | |
| intel | core_i7-6785r | - | |
| intel | core_i7-6700k_firmware | - | |
| intel | core_i7-6700k | - | |
| intel | core_i7-6700t_firmware | - | |
| intel | core_i7-6700t | - | |
| intel | core_i7-6700te_firmware | - | |
| intel | core_i7-6700te | - | |
| intel | core_i7-6700_firmware | - | |
| intel | core_i7-6700 | - | |
| intel | core_i7-6770hq_firmware | - | |
| intel | core_i7-6770hq | - | |
| intel | core_i7-6700hq_firmware | - | |
| intel | core_i7-6700hq | - | |
| intel | core_i7-6660u_firmware | - | |
| intel | core_i7-6660u | - | |
| intel | core_i7-6650u_firmware | - | |
| intel | core_i7-6650u | - | |
| intel | core_i7-6600u_firmware | - | |
| intel | core_i7-6600u | - | |
| intel | core_i7-6567u_firmware | - | |
| intel | core_i7-6567u | - | |
| intel | core_i7-6560u_firmware | - | |
| intel | core_i7-6560u | - | |
| intel | core_i7-6500u_firmware | - | |
| intel | core_i7-6500u | - | |
| intel | core_i5-7600k_firmware | - | |
| intel | core_i5-7600k | - | |
| intel | core_i5-7600t_firmware | - | |
| intel | core_i5-7600t | - | |
| intel | core_i5-7600_firmware | - | |
| intel | core_i5-7600 | - | |
| intel | core_i5-7500_firmware | - | |
| intel | core_i5-7500 | - | |
| intel | core_i5-7500t_firmware | - | |
| intel | core_i5-7500t | - | |
| intel | core_i5-7442eq_firmware | - | |
| intel | core_i5-7442eq | - | |
| intel | core_i5-7440hq_firmware | - | |
| intel | core_i5-7440hq | - | |
| intel | core_i5-7440eq_firmware | - | |
| intel | core_i5-7440eq | - | |
| intel | core_i5-7400t_firmware | - | |
| intel | core_i5-7400t | - | |
| intel | core_i5-7400_firmware | - | |
| intel | core_i5-7400 | - | |
| intel | core_i5-7360u_firmware | - | |
| intel | core_i5-7360u | - | |
| intel | core_i5-7300u_firmware | - | |
| intel | core_i5-7300u | - | |
| intel | core_i5-7300hq_firmware | - | |
| intel | core_i5-7300hq | - | |
| intel | core_i5-7287u_firmware | - | |
| intel | core_i5-7287u | - | |
| intel | core_i5-7267u_firmware | - | |
| intel | core_i5-7267u | - | |
| intel | core_i5-7260u_firmware | - | |
| intel | core_i5-7260u | - | |
| intel | core_i5-7200u_firmware | - | |
| intel | core_i5-7200u | - | |
| intel | core_i5-7y54_firmware | - | |
| intel | core_i5-7y54 | - | |
| intel | core_i5-7y57_firmware | - | |
| intel | core_i5-7y57 | - | |
| intel | core_i7-7920hq_firmware | - | |
| intel | core_i7-7920hq | - | |
| intel | core_i7-7820hq_firmware | - | |
| intel | core_i7-7820hq | - | |
| intel | core_i7-7820hk_firmware | - | |
| intel | core_i7-7820hk | - | |
| intel | core_i7-7820eq_firmware | - | |
| intel | core_i7-7820eq | - | |
| intel | core_i7-7700hq_firmware | - | |
| intel | core_i7-7700hq | - | |
| intel | core_i7-7700__firmware | - | |
| intel | core_i7-7700_ | - | |
| intel | core_i7-7700k_firmware | - | |
| intel | core_i7-7700k | - | |
| intel | core_i7-7700t_firmware | - | |
| intel | core_i7-7700t | - | |
| intel | core_i7-7660u_firmware | - | |
| intel | core_i7-7660u | - | |
| intel | core_i7-7600u_firmware | - | |
| intel | core_i7-7600u | - | |
| intel | core_i7-7567u_firmware | - | |
| intel | core_i7-7567u | - | |
| intel | core_i7-7560u_firmware | - | |
| intel | core_i7-7560u | - | |
| intel | core_i7-7500u_firmware | - | |
| intel | core_i7-7500u | - | |
| intel | core_i7-7y75_firmware | - | |
| intel | core_i7-7y75 | - | |
| intel | core_i7-8665ue_firmware | - | |
| intel | core_i7-8665ue | - | |
| intel | core_i7-8665u_firmware | - | |
| intel | core_i7-8665u | - | |
| intel | core_i7-8557u_firmware | - | |
| intel | core_i7-8557u | - | |
| intel | core_i7-8850h_firmware | - | |
| intel | core_i7-8850h | - | |
| intel | core_i7-8809g_firmware | - | |
| intel | core_i7-8809g | - | |
| intel | core_i7-8750h_firmware | - | |
| intel | core_i7-8750h | - | |
| intel | core_i7-8709g_firmware | - | |
| intel | core_i7-8709g | - | |
| intel | core_i7-8706g_firmware | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8706g_firmware | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8705g_firmware | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8700t_firmware | - | |
| intel | core_i7-8700t | - | |
| intel | core_i7-8700k_firmware | - | |
| intel | core_i7-8700k | - | |
| intel | core_i7-8700b_firmware | - | |
| intel | core_i7-8700b | - | |
| intel | core_i7-8700_firmware | - | |
| intel | core_i7-8700 | - | |
| intel | core_i7\+8700_firmware | - | |
| intel | core_i7\+8700 | - | |
| intel | core_i7-8569u_firmware | - | |
| intel | core_i7-8569u | - | |
| intel | core_i7-8650u_firmware | - | |
| intel | core_i7-8650u | - | |
| intel | core_i7-8565u_firmware | - | |
| intel | core_i7-8565u | - | |
| intel | core_i7-8559u_firmware | - | |
| intel | core_i7-8559u | - | |
| intel | core_i7-8550u_firmware | - | |
| intel | core_i7-8550u | - | |
| intel | core_i7-8500y_firmware | - | |
| intel | core_i7-8500y | - | |
| intel | core_i7-8086k_firmware | - | |
| intel | core_i7-8086k | - | |
| intel | core_i9-9980hk_firmware | - | |
| intel | core_i9-9980hk | - | |
| intel | core_i9-9880h_firmware | - | |
| intel | core_i9-9880h | - | |
| intel | core_i9-9900t_firmware | - | |
| intel | core_i9-9900t | - | |
| intel | core_i9-9900ks_firmware | - | |
| intel | core_i9-9900ks | - | |
| intel | core_i9-9900kf_firmware | - | |
| intel | core_i9-9900kf | - | |
| intel | core_i9-9900k_firmware | - | |
| intel | core_i9-9900k | - | |
| intel | core_i9-9900_firmware | - | |
| intel | core_i9-9900 | - | |
| intel | core_i7-9850hl_firmware | - | |
| intel | core_i7-9850hl | - | |
| intel | core_i7-9850he_firmware | - | |
| intel | core_i7-9850he | - | |
| intel | core_i7-9850h_firmware | - | |
| intel | core_i7-9850h | - | |
| intel | core_i7-9750hf_firmware | - | |
| intel | core_i7-9750hf | - | |
| intel | core_i7-9750h_firmware | - | |
| intel | core_i7-9750h | - | |
| intel | core_i7-9700te_firmware | - | |
| intel | core_i7-9700te | - | |
| intel | core_i7-9700t_firmware | - | |
| intel | core_i7-9700t | - | |
| intel | core_i7-9700kf_firmware | - | |
| intel | core_i7-9700kf | - | |
| intel | core_i7-9700k_firmware | - | |
| intel | core_i7-9700k | - | |
| intel | core_i7-9700f_firmware | - | |
| intel | core_i7-9700f | - | |
| intel | core_i7-9700e_firmware | - | |
| intel | core_i7-9700e | - | |
| intel | core_i7-9700_firmware | - | |
| intel | core_i7-9700 | - | |
| intel | xeon_e3-1585_v5_firmware | - | |
| intel | xeon_e3-1585_v5 | - | |
| intel | xeon_e3-1585l_v5_firmware | - | |
| intel | xeon_e3-1585l_v5 | - | |
| intel | xeon_e3-1578l_v5_firmware | - | |
| intel | xeon_e3-1578l_v5 | - | |
| intel | xeon_e3-1575m_v5_firmware | - | |
| intel | xeon_e3-1575m_v5 | - | |
| intel | xeon_e3-1565l_v5_firmware | - | |
| intel | xeon_e3-1565l_v5 | - | |
| intel | xeon_e3-1558l_v5_firmware | - | |
| intel | xeon_e3-1558l_v5 | - | |
| intel | xeon_e3-1545m_v5_firmware | - | |
| intel | xeon_e3-1545m_v5 | - | |
| intel | xeon_e3-1535m_v5_firmware | - | |
| intel | xeon_e3-1535m_v5 | - | |
| intel | xeon_e3-1515m_v5_firmware | - | |
| intel | xeon_e3-1515m_v5 | - | |
| intel | xeon_e3-1505m_v5_firmware | - | |
| intel | xeon_e3-1505m_v5 | - | |
| intel | xeon_e3-1505l_v5_firmware | - | |
| intel | xeon_e3-1505l_v5 | - | |
| intel | xeon_e3-1280_v5_firmware | - | |
| intel | xeon_e3-1280_v5 | - | |
| intel | xeon_e3-1275_v5_firmware | - | |
| intel | xeon_e3-1275_v5 | - | |
| intel | xeon_e3-1270_v5_firmware | - | |
| intel | xeon_e3-1270_v5 | - | |
| intel | xeon_e3-1268l_v5_firmware | - | |
| intel | xeon_e3-1268l_v5 | - | |
| intel | xeon_e3-1260l_v5_firmware | - | |
| intel | xeon_e3-1260l_v5 | - | |
| intel | xeon_e3-1245_v5_firmware | - | |
| intel | xeon_e3-1245_v5 | - | |
| intel | xeon_e3-1240l_v5_firmware | - | |
| intel | xeon_e3-1240l_v5 | - | |
| intel | xeon_e3-1240_v5_firmware | - | |
| intel | xeon_e3-1240_v5 | - | |
| intel | xeon_e3-1235l_v5_firmware | - | |
| intel | xeon_e3-1235l_v5 | - | |
| intel | xeon_e3-1230_v5_firmware | - | |
| intel | xeon_e3-1230_v5 | - | |
| intel | xeon_e3-1225_v5_firmware | - | |
| intel | xeon_e3-1225_v5 | - | |
| intel | xeon_e3-1220_v5_firmware | - | |
| intel | xeon_e3-1220_v5 | - | |
| intel | xeon_e3-1535m_v6_firmware | - | |
| intel | xeon_e3-1535m_v6 | - | |
| intel | xeon_e3-1505m_v6_firmware | - | |
| intel | xeon_e3-1505m_v6 | - | |
| intel | xeon_e3-1505l_v6_firmware | - | |
| intel | xeon_e3-1505l_v6 | - | |
| intel | xeon_e3-1501l_v6_firmware | - | |
| intel | xeon_e3-1501l_v6 | - | |
| intel | xeon_e3-1501m_v6_firmware | - | |
| intel | xeon_e3-1501m_v6 | - | |
| intel | xeon_e3-1285_v6_firmware | - | |
| intel | xeon_e3-1285_v6 | - | |
| intel | xeon_e3-1280_v6_firmware | - | |
| intel | xeon_e3-1280_v6 | - | |
| intel | xeon_e3-1275_v6_firmware | - | |
| intel | xeon_e3-1275_v6 | - | |
| intel | xeon_e3-1270_v6_firmware | - | |
| intel | xeon_e3-1270_v6 | - | |
| intel | xeon_e3-1245_v6_firmware | - | |
| intel | xeon_e3-1245_v6 | - | |
| intel | xeon_e3-1240_v6_firmware | - | |
| intel | xeon_e3-1240_v6 | - | |
| intel | xeon_e3-1230_v6_firmware | - | |
| intel | xeon_e3-1230_v6 | - | |
| intel | xeon_e3-1225_v6_firmware | - | |
| intel | xeon_e3-1225_v6 | - | |
| intel | xeon_e3-1220_v6_firmware | - | |
| intel | xeon_e3-1220_v6 | - | |
| intel | xeon_e-2288g_firmware | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2286m_firmware | - | |
| intel | xeon_e-2286m | - | |
| intel | xeon_e-2286g_firmware | - | |
| intel | xeon_e-2286g | - | |
| intel | xeon_e-2278gel_firmware | - | |
| intel | xeon_e-2278gel | - | |
| intel | xeon_e-2278ge_firmware | - | |
| intel | xeon_e-2278ge | - | |
| intel | xeon_e-2278g_firmware | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2276ml_firmware | - | |
| intel | xeon_e-2276ml | - | |
| intel | xeon_e-2276me_firmware | - | |
| intel | xeon_e-2276me | - | |
| intel | xeon_e-2276m_firmware | - | |
| intel | xeon_e-2276m | - | |
| intel | xeon_e-2276g_firmware | - | |
| intel | xeon_e-2276g | - | |
| intel | xeon_e-2274g_firmware | - | |
| intel | xeon_e-2274g | - | |
| intel | xeon_e-2254ml_firmware | - | |
| intel | xeon_e-2254ml | - | |
| intel | xeon_e-2254me_firmware | - | |
| intel | xeon_e-2254me | - | |
| intel | xeon_e-2246g_firmware | - | |
| intel | xeon_e-2246g | - | |
| intel | xeon_e-2244g_firmware | - | |
| intel | xeon_e-2244g | - | |
| intel | xeon_e-2236_firmware | - | |
| intel | xeon_e-2236 | - | |
| intel | xeon_e-2234_firmware | - | |
| intel | xeon_e-2234 | - | |
| intel | xeon_e-2226ge_firmware | - | |
| intel | xeon_e-2226ge | - | |
| intel | xeon_e-2226g_firmware | - | |
| intel | xeon_e-2226g | - | |
| intel | xeon_e-2224_firmware | - | |
| intel | xeon_e-2224 | - | |
| intel | xeon_e-2224g_firmware | - | |
| intel | xeon_e-2224g | - | |
| intel | xeon_e-2186g_firmware | - | |
| intel | xeon_e-2186g | - | |
| intel | xeon_e-2186m_firmware | - | |
| intel | xeon_e-2186m | - | |
| intel | xeon_e-2176g_firmware | - | |
| intel | xeon_e-2176g | - | |
| intel | xeon_e-2176m_firmware | - | |
| intel | xeon_e-2176m | - | |
| intel | xeon_e-2174g_firmware | - | |
| intel | xeon_e-2174g | - | |
| intel | xeon_e-2146g_firmware | - | |
| intel | xeon_e-2146g | - | |
| intel | xeon_e-2144g_firmware | - | |
| intel | xeon_e-2144g | - | |
| intel | xeon_e-2136_firmware | - | |
| intel | xeon_e-2136 | - | |
| intel | xeon_e-2134_firmware | - | |
| intel | xeon_e-2134 | - | |
| intel | xeon_e-2126g_firmware | - | |
| intel | xeon_e-2126g | - | |
| intel | xeon_e-2124_firmware | - | |
| intel | xeon_e-2124 | - | |
| intel | xeon_e-2124g_firmware | - | |
| intel | xeon_e-2124g | - | |
| intel | xeon_e-2288g_firmware | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2286m_firmware | - | |
| intel | xeon_e-2286m | - | |
| intel | xeon_e-2286g_firmware | - | |
| intel | xeon_e-2286g | - | |
| intel | xeon_e-2278gel_firmware | - | |
| intel | xeon_e-2278gel | - | |
| intel | xeon_e-2278ge_firmware | - | |
| intel | xeon_e-2278ge | - | |
| intel | xeon_e-2278g_firmware | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2276ml_firmware | - | |
| intel | xeon_e-2276ml | - | |
| intel | xeon_e-2276me_firmware | - | |
| intel | xeon_e-2276me | - | |
| intel | xeon_e-2276m_firmware | - | |
| intel | xeon_e-2276m | - | |
| intel | xeon_e-2276g_firmware | - | |
| intel | xeon_e-2276g | - | |
| intel | xeon_e-2274g_firmware | - | |
| intel | xeon_e-2274g | - | |
| intel | xeon_e-2254ml_firmware | - | |
| intel | xeon_e-2254ml | - | |
| intel | xeon_e-2254me_firmware | - | |
| intel | xeon_e-2254me | - | |
| intel | xeon_e-2246g_firmware | - | |
| intel | xeon_e-2246g | - | |
| intel | xeon_e-2244g_firmware | - | |
| intel | xeon_e-2244g | - | |
| intel | xeon_e-2236_firmware | - | |
| intel | xeon_e-2236 | - | |
| intel | xeon_e-2234_firmware | - | |
| intel | xeon_e-2234 | - | |
| intel | xeon_e-2226ge_firmware | - | |
| intel | xeon_e-2226ge | - | |
| intel | xeon_e-2226g_firmware | - | |
| intel | xeon_e-2226g | - | |
| intel | xeon_e-2224_firmware | - | |
| intel | xeon_e-2224 | - | |
| intel | xeon_e-2224g_firmware | - | |
| intel | xeon_e-2224g | - | |
| intel | xeon_e-2186g_firmware | - | |
| intel | xeon_e-2186g | - | |
| intel | xeon_e-2186m_firmware | - | |
| intel | xeon_e-2186m | - | |
| intel | xeon_e-2176g_firmware | - | |
| intel | xeon_e-2176g | - | |
| intel | xeon_e-2176m_firmware | - | |
| intel | xeon_e-2176m | - | |
| intel | xeon_e-2174g_firmware | - | |
| intel | xeon_e-2174g | - | |
| intel | xeon_e-2146g_firmware | - | |
| intel | xeon_e-2146g | - | |
| intel | xeon_e-2144g_firmware | - | |
| intel | xeon_e-2144g | - | |
| intel | xeon_e-2136_firmware | - | |
| intel | xeon_e-2136 | - | |
| intel | xeon_e-2134_firmware | - | |
| intel | xeon_e-2134 | - | |
| intel | xeon_e-2126g_firmware | - | |
| intel | xeon_e-2126g | - | |
| intel | xeon_e-2124_firmware | - | |
| intel | xeon_e-2124 | - | |
| intel | xeon_e-2124g_firmware | - | |
| intel | xeon_e-2124g | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37ED0DB6-A589-4CB7-87AD-102FE7490AC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EB3692-06DA-4EED-8F5E-D21ECC9EEDEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20EE53DA-4639-4714-B956-CC69BBCC6D26",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A86F4A2B-B4B4-42E2-8D5D-E31D06456C76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237D4E3F-F132-4D6E-95F8-C607EC09CB50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6484B4DA-85FA-4BF9-9B4A-157BC2ED2889",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A91E832-9A60-4552-9388-DA779F9C4A9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34D8B71-549C-400A-976F-AA170F1D7B08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A0BDFFB-638F-4FB7-A43A-812874D8774A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1912C4B-2371-463E-868C-3C35050E2A06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46994C87-8D86-4699-8257-DFAB90D08A09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBDCB2FA-B3D8-4922-B8B5-7FAA4A574D0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE88726F-B548-4FF1-8E76-90DD6CFC12E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DD0B86-37A4-4927-97C5-86B165590105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8851E2-CD05-4575-83E3-F801C1785A59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB96985-BB1A-4F60-8259-E3AD4ACAD8CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CFAE743-376B-4FD1-8391-664D97667105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C00E0312-D1D1-410D-A3A1-74495AA1C2C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43CEC4C5-B559-4A48-A1D2-7CDB96381CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72876C5-C084-4DD3-9BC8-894C4BE40C15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53B450C9-CDC4-4047-AD77-19A4BC9CB870",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3244927F-488B-4F7D-A616-02D26E64C88C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66430AA1-841C-4204-8846-B2FBEFF4269A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D1D375-D4AE-4866-8472-30EBF2A6F057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E1FB35-EB0D-46D9-8B07-5B74CD56B36C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52E5B70-12E0-4AA2-81E5-71BBBFA1D500",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB1CF02E-EFEB-4841-9E57-27E6874A25F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2128AB8F-506E-4E75-AEBE-418EDFE083FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F70F59-FFE5-4A21-8299-B59C9FD2417B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01CD5DEE-86B0-4431-A542-603300A28DB3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84928CAE-996F-42F9-8CB2-E3BC13E3D448",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A308E6AF-16CB-4722-8318-94F7B1877535",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AB7E123-7871-4ED7-B76E-DC0151035B96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "828E6E11-A376-4F40-9077-81B9000B2692",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419D32E2-D53C-4A81-8E9D-E79FD5D89B7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1737E9B0-D3DF-4B8A-8548-9B2CD94EB31F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "059D9645-5A07-44C5-A3B7-E8948D5F942A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "634087B5-A4D5-45AC-871F-7E785F48B9C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC557726-C2D4-4E95-AE20-85FE621586FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45BC7EDA-83CD-488A-84B4-9B41B4780DE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80A4E442-8E2C-472B-A9C6-56B58B6B55B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43695191-7897-4028-A8DA-F45D2B4E0C38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E88CE3A-812A-4C01-B0D7-D9A154FF2187",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C70D1724-ED58-4675-9A53-F7473D77638B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D8BAD9D-7253-492A-87B3-CACCF66A332F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7700__firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F633EA5-829B-4272-BA86-7A1DF479F207",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700_:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E3FC1B2-E1ED-4D00-8FE0-75295786817A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65ABD229-0EF3-44AC-AD87-6C42EF48BF2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFC1253-B337-4F9B-855D-14A3F6AE7EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61BD341-9D1F-444C-A5C9-761994866ED2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77C3D738-944D-46A1-A542-32C96A021964",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A20E7888-D3A3-4A01-8328-71A81AA0A52A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45D72230-B7C2-4A9C-928F-328666CA3988",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16807D5E-1E13-4A98-8217-9AF6CE24A933",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54606FA5-02CE-43C5-9153-FB1070E9DD15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B60A1C2-D6E2-43B3-967C-746CDC2F96CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "942B77AD-CEA4-4A9F-B748-155916A4917A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "581CCD85-F9BA-4AE0-8FCD-4118C13C1080",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C365D42-1DEA-4FF2-86E4-1CC27E52E40E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3625E5-4583-4F38-B6E3-68FD20E54ACB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455BC769-5B19-4B91-844B-15B4FB2401E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FD2F07-6CD0-4708-8D11-3BA0AEFD5271",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419680D5-21E0-491C-98AA-9D079213A020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1163CF40-4D70-4965-8229-B102D754ECD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "199A5D61-EB42-4C3C-9344-4CA497358D7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662A5846-DA15-431B-9392-F0BA5457FDE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD7CD68D-6177-4F61-ABAF-C88453BD6C52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "216DE05B-001E-47FE-B35A-55319B095853",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A6C110-BE1A-4D3E-A048-D63F4F64B1E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D19BB027-D927-4D06-A580-6C6E3E077B7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEA4F635-86BE-409A-A619-9EEA4C4B4FBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F981A8EE-13BB-42C2-91D0-631247A03CB6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A3CE35-5572-4355-B063-08DA49917126",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8F7DCA-3FA7-4943-9458-13695F529BBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C619D6-6275-465E-9023-25EEFC298711",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "077BFDB3-CACE-4600-8ABE-DE079EDA8D6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A49E7867-14E6-4DB4-93D8-A108996F7B75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8925FB8-D645-4DE0-A37A-4BCAEA1EBE08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CE1171D-9B4E-4134-8489-F44B2912E310",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E61222-34B1-47AB-806F-DAAA4B41BD45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E257946A-458F-4F27-8387-9CF4DB8193FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5919FA36-0AB9-4D42-B33F-7795BD7601BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1746995D-CCA1-4858-87C5-8E2DC51FDA75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7ABA76A-91AE-4524-9013-2BF843FFB5DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47759461-35C3-4F77-9D96-B4929075CC17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3760BA20-5E0D-460C-BDD5-6E456646D814",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "030F2C9A-E9F8-4B29-857A-B6A895C54A61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5111864-B660-4603-BC03-94A719C8D2EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE48BFF-CCB4-423D-968C-013060E447E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C056C18D-457C-4216-8B91-84A4628DE44E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1273C6-1F76-4366-88A2-A3955CB1CE3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9BABD0-E0D7-4D9D-B998-0FB23612E7BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17F6A70D-4925-49A7-BFE9-A1B7F2CD6FF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6185880A-E648-46C3-B14E-42DB61113C59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65F8523D-BA5F-4BD8-A15F-A49B12001986",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE98CB9-14D8-4297-807B-33F9B376D37B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B02BC8-A29C-48B9-B66C-2BD9C241DFD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3214D779-E335-4141-882F-CBB3A3317CDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A393CA-35AB-4F8D-9A33-9693905DA445",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39616E34-9182-485B-B6AE-566DE2E77AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68C14E0-5711-4D18-B529-AA0EE3BDC99C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DFD79A0-2F24-484C-AD4A-D58B7414788E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE469B71-77FC-4940-AF10-631D73DEF18A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E6609BC-7E90-41F9-91A3-4139100D7A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC07C3B-8ECF-4BF1-A08D-907319EFFC34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29EEEF17-0881-448C-A984-D5EFCB0F68EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FAB23F-A289-42E6-BA8E-C4A061A9604C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39616E34-9182-485B-B6AE-566DE2E77AA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68C14E0-5711-4D18-B529-AA0EE3BDC99C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DFD79A0-2F24-484C-AD4A-D58B7414788E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE469B71-77FC-4940-AF10-631D73DEF18A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E6609BC-7E90-41F9-91A3-4139100D7A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC07C3B-8ECF-4BF1-A08D-907319EFFC34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29EEEF17-0881-448C-A984-D5EFCB0F68EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FAB23F-A289-42E6-BA8E-C4A061A9604C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso insuficiente en el subsistema de memoria protegida para Intel\u00ae SGX de 6th, 7th, 8th, 9th Generation Intel\u00ae Core(TM) Processor Families; Intel\u00ae Xeon\u00ae Processor E3-1500 v5, v6 Families; Procesador Intel\u00ae Xeon\u00ae E3-1500 v5, v6 Families; Intel\u00ae Xeon\u00ae E-2100 \u0026amp; E-2200 Processor Families con Intel\u00ae Processor Graphics, puede habilitar a un usuario privilegiado para permitir una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-0117",
  "lastModified": "2024-11-21T04:16:15.730",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T20:15:11.227",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-hg94-7qqv-5v36
Vulnerability from github
Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.
{
  "affected": [],
  "aliases": [
    "CVE-2019-0117"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2019-11-14T20:15:00Z",
    "severity": "LOW"
  },
  "details": "Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 \u0026 E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.",
  "id": "GHSA-hg94-7qqv-5v36",
  "modified": "2022-05-24T17:00:52Z",
  "published": "2022-05-24T17:00:52Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0117"
    },
    {
      "type": "WEB",
      "url": "https://support.f5.com/csp/article/K73837233?utm_source=f5support\u0026amp;utm_medium=RSS"
    },
    {
      "type": "WEB",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  CERTFR-2020-AVI-618
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security (SNS) versions antérieures à 4.1.1. Cette version est la seule qui corrige toutes les vulnérabilités mentionnées dans les avis Stormshield dont les liens sont présentés ici. Nous invitons nos lecteurs à faire leur propre analyse de risque quant au choix de la version qui correspond le mieux à leurs besoins. | ||
| Stormshield | N/A | Netasq versions 9.x | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Stormshield Network Security (SNS) versions ant\u00e9rieures \u00e0 4.1.1. Cette version est la seule qui corrige toutes les vuln\u00e9rabilit\u00e9s mentionn\u00e9es dans les avis Stormshield dont les liens sont pr\u00e9sent\u00e9s ici. Nous invitons nos lecteurs \u00e0 faire leur propre analyse de risque quant au choix de la version qui correspond le mieux \u00e0 leurs besoins.",
      "product": {
        "name": "Stormshield Network Security",
        "vendor": {
          "name": "Stormshield",
          "scada": false
        }
      }
    },
    {
      "description": "Netasq versions 9.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Stormshield",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-11139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
    },
    {
      "name": "CVE-2019-0117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
    },
    {
      "name": "CVE-2019-11157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11157"
    },
    {
      "name": "CVE-2020-0549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
    },
    {
      "name": "CVE-2016-8858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
    },
    {
      "name": "CVE-2020-11711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11711"
    },
    {
      "name": "CVE-2019-14607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14607"
    },
    {
      "name": "CVE-2018-12207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
    },
    {
      "name": "CVE-2019-0184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
    },
    {
      "name": "CVE-2019-0123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
    },
    {
      "name": "CVE-2020-0548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
    }
  ],
  "initial_release_date": "2020-10-05T00:00:00",
  "last_revision_date": "2020-10-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-618",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-10-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-013 du 17 septembre 2020",
      "url": "https://advisories.stormshield.eu/2020-013/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-012 du 17 septembre 2020",
      "url": "https://advisories.stormshield.eu/2020-012/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2019-013 du 17 septembre 2020",
      "url": "https://advisories.stormshield.eu/2019-013/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2019-026 du 17 septembre 2020",
      "url": "https://advisories.stormshield.eu/2019-026/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-011 du 17 septembre 2020",
      "url": "https://advisories.stormshield.eu/2020-011/"
    }
  ]
}
  CERTFR-2019-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les microgiciels Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel PTT versions antérieures à 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-X_x antérieures à SPS_SoC-X_04.00.04.086.0 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x antérieures à 11.22.70 | ||
| Intel | N/A | Les processeurs Intel, voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x antérieures à 13.0.10 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x antérieures à 12.0.45 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions antérieures à 11.8.70 | ||
| Intel | N/A | Intel SPS versions SPS_E5_x antérieures à SPS_E5_04.00.04.381.0 | ||
| Intel | N/A | Intel SPS versions SPS_E3_x antérieures à SPS_E3_04.01.04.054.0 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-A_x antérieures à SPS_SoC-A_04.00.04.181.0 | ||
| Intel | N/A | Le microgiciel des contrôleurs Ethernet Intel séries 700 versions antérieures à 7.0 | ||
| Intel | N/A | Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Le logiciel pour contrôleurs Ethernet Intel séries 700 versions antérieure à 24.0 | ||
| Intel | N/A | Intel TXE versions 3.0.x et 3.1.x antérieures à 3.1.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x antérieures à 11.11.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x antérieures à 14.0.10 | ||
| Intel | N/A | Intel TXE versions 4.0.x antérieures à 4.0.20 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel PTT versions ant\u00e9rieures \u00e0 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions SPS_SoC-X_x ant\u00e9rieures \u00e0 SPS_SoC-X_04.00.04.086.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x ant\u00e9rieures \u00e0 11.22.70",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les processeurs Intel, voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x ant\u00e9rieures \u00e0 13.0.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x ant\u00e9rieures \u00e0 12.0.45",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions ant\u00e9rieures \u00e0 11.8.70",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions SPS_E5_x ant\u00e9rieures \u00e0 SPS_E5_04.00.04.381.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions SPS_E3_x ant\u00e9rieures \u00e0 SPS_E3_04.01.04.054.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions SPS_SoC-A_x ant\u00e9rieures \u00e0 SPS_SoC-A_04.00.04.181.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Le microgiciel des contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieures \u00e0 7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Le logiciel pour contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieure \u00e0 24.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel TXE versions 3.0.x et 3.1.x ant\u00e9rieures \u00e0 3.1.70",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x ant\u00e9rieures \u00e0 11.11.70",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x ant\u00e9rieures \u00e0 14.0.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel TXE versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-0143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0143"
    },
    {
      "name": "CVE-2019-11179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11179"
    },
    {
      "name": "CVE-2019-11139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
    },
    {
      "name": "CVE-2019-0150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0150"
    },
    {
      "name": "CVE-2019-0152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
    },
    {
      "name": "CVE-2019-0169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
    },
    {
      "name": "CVE-2019-11097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
    },
    {
      "name": "CVE-2019-0117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
    },
    {
      "name": "CVE-2019-11170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11170"
    },
    {
      "name": "CVE-2019-11132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
    },
    {
      "name": "CVE-2019-11086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
    },
    {
      "name": "CVE-2019-11137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11137"
    },
    {
      "name": "CVE-2019-0154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
    },
    {
      "name": "CVE-2019-11106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
    },
    {
      "name": "CVE-2019-11175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11175"
    },
    {
      "name": "CVE-2019-0139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0139"
    },
    {
      "name": "CVE-2019-0140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0140"
    },
    {
      "name": "CVE-2019-11172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11172"
    },
    {
      "name": "CVE-2019-11177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11177"
    },
    {
      "name": "CVE-2019-11135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
    },
    {
      "name": "CVE-2019-0168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
    },
    {
      "name": "CVE-2019-11103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
    },
    {
      "name": "CVE-2019-11107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
    },
    {
      "name": "CVE-2019-0141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0141"
    },
    {
      "name": "CVE-2019-11136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11136"
    },
    {
      "name": "CVE-2019-0149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0149"
    },
    {
      "name": "CVE-2019-11181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11181"
    },
    {
      "name": "CVE-2019-11110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
    },
    {
      "name": "CVE-2019-0144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0144"
    },
    {
      "name": "CVE-2019-11173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11173"
    },
    {
      "name": "CVE-2019-11182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11182"
    },
    {
      "name": "CVE-2019-11102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
    },
    {
      "name": "CVE-2019-11088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
    },
    {
      "name": "CVE-2019-11105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
    },
    {
      "name": "CVE-2019-0124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0124"
    },
    {
      "name": "CVE-2019-0151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
    },
    {
      "name": "CVE-2019-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11168"
    },
    {
      "name": "CVE-2019-11101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
    },
    {
      "name": "CVE-2019-11171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11171"
    },
    {
      "name": "CVE-2018-12207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
    },
    {
      "name": "CVE-2019-0142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0142"
    },
    {
      "name": "CVE-2019-11131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
    },
    {
      "name": "CVE-2019-0146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0146"
    },
    {
      "name": "CVE-2019-11090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
    },
    {
      "name": "CVE-2019-0131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
    },
    {
      "name": "CVE-2019-11109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
    },
    {
      "name": "CVE-2019-11178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11178"
    },
    {
      "name": "CVE-2019-0166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
    },
    {
      "name": "CVE-2019-0184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
    },
    {
      "name": "CVE-2019-0123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
    },
    {
      "name": "CVE-2019-11180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11180"
    },
    {
      "name": "CVE-2019-11104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
    },
    {
      "name": "CVE-2019-0148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0148"
    },
    {
      "name": "CVE-2019-11087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
    },
    {
      "name": "CVE-2019-11174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11174"
    },
    {
      "name": "CVE-2019-0145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0145"
    },
    {
      "name": "CVE-2019-11108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
    },
    {
      "name": "CVE-2019-0147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0147"
    },
    {
      "name": "CVE-2019-11100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
    },
    {
      "name": "CVE-2019-0165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
    },
    {
      "name": "CVE-2019-11147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
    }
  ],
  "initial_release_date": "2019-11-13T00:00:00",
  "last_revision_date": "2019-11-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-563",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les microgiciels\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les microgiciels Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00313 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00219 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00270 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00210 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00240 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00255 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00271 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00260 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00280 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00164 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00241 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00220 du 12 novembre 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.