Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-23824 (GCVE-0-2022-23824)
Vulnerability from cvelistv5
- NA
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AMD | AMD Processors |
Version: Processor various |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:51:46.071Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
},
{
"name": "FEDORA-2022-9f51d13fa3",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
},
{
"name": "FEDORA-2022-53a4a5dd11",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
},
{
"name": "DSA-5378",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5378"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202402-07"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AMD Processors",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "Processor various"
}
]
}
],
"datePublic": "2022-11-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NA",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-17T01:23:48.000Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
},
{
"name": "FEDORA-2022-9f51d13fa3",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
},
{
"name": "FEDORA-2022-53a4a5dd11",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
},
{
"name": "DSA-5378",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5378"
},
{
"url": "https://security.gentoo.org/glsa/202402-07"
}
],
"source": {
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2022-23824",
"datePublished": "2022-11-09T20:48:06.826Z",
"dateReserved": "2022-01-21T00:00:00.000Z",
"dateUpdated": "2025-02-13T16:32:23.589Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-23824\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2022-11-09T21:15:13.530\",\"lastModified\":\"2024-11-21T06:49:19.587\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.\"},{\"lang\":\"es\",\"value\":\"IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA1950D-1D9F-4401-AA86-CF3028EFD286\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD38BB02-752E-44C8-B878-FF7D4E95B452\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6AC60D3-EE6C-46A3-8068-158D83995BD1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60123EE-1B7B-4430-8B01-0591F31D54D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DDA64FE-29DE-4A7B-82D0-D409B38BB67A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0464E67E-DC8F-48CB-BA80-B3E3B7EC835F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6317AB4-E945-4BF6-A11B-7D076AEF74A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88E56678-04A0-447E-BC96-0CF73A340C9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7947AC99-3250-46C6-8C92-382F8956B39B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE7A27E-1900-4D51-B5F8-9C243CF3E544\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9E0845-FB81-47FC-B083-D7A76AA49D14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824EE36A-E397-476A-B5CF-0C131FA74079\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484FC127-05CB-423F-8CEE-C442ABEBC7E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005989E4-6826-46D8-AEFA-3B07FB6EF31C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303F661B-45E9-4AC1-9B98-62E4D705102D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4A79BA-E498-4819-96C5-3D607A2727DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8A44FC-9790-4202-80BE-203AD0E86E15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132192AC-BC59-4C61-B826-F91A82956437\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684F36CB-2355-45F5-B6E1-7157CA9225D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192EE6CF-0494-458F-96EF-311FB6076AAF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A05BAA-D9ED-411D-AEC7-DBD8998C345E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B4FEA-CFB2-429C-818B-9277B6D546C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180B3002-B3C5-48B5-8322-5B64B237C5B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C8CF00-8FC8-4206-9028-6F104699DE76\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07E922F-C1AB-469C-A1C1-9F9E58332DFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE5D42-1C62-4381-89E0-8F3264F696EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168076CD-1E6D-4328-AB59-4C1A90735AC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02B1C69-BAA4-485B-BE22-46BE321F9E4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B3C659-C31A-4F82-9587-9F8A943F637D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FAAD8C-6DD1-408D-849B-0CE707321B13\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA61ADB-2FEA-459A-BF4F-C55401479107\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF5F66-636C-4637-96F7-0FA45BB7C64B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492017EE-C13F-4C40-887F-9C3C9F439898\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E02A9C95-DF12-4816-88C3-6AFC331B8426\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE640-381F-449B-ACB1-F1BD255683C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC4BECA-6023-4225-9685-937E47C67C1F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D2C602-8086-4FC4-AE89-0842A453E56E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D777E18-B7ED-42CF-A2C4-87426B04E8EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237AB35F-1702-418D-8193-F8B387B7F644\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5EE04-23BC-48E6-A171-D63C8258E317\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0005355A-DA7A-417D-8AF9-F6CC880040BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA92163-5A72-4271-89D4-401C24950F62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"954500F1-6466-4A1C-8E0C-D759121CEBDC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D7F33C-F522-4A20-9055-1662178D7F27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBF39F8-2317-432A-846D-7FEC2C35EEE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9825AB7C-7675-4364-BCE3-4C63BD41780A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937E2FA2-BED8-48FF-8D01-153D4039F224\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D814C2A-D794-46A8-9A06-CC4DB387176F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D640C5C-C906-41A2-96BC-19299ADB9446\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474D45CF-EBBE-4013-B8EC-BCA3293B36B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D70D28B-809E-456C-96ED-84A4CA7EC942\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D1E9A6F-7339-4679-B83B-87BC1BEEFA16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BEC933-8C69-4E47-B527-DA3ED3233B2D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978DF75D-F7B7-40F6-8054-9551306106F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE43349A-246E-45E9-8CD5-E417DB270445\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D99997-1389-493E-BDEA-9904A46E48EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99E921-4023-4E28-BAB7-A830487B3850\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"211D05DA-2A44-4FC6-9EE4-8A6D713AC967\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824EE36A-E397-476A-B5CF-0C131FA74079\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADD2AB0-D3F7-43BD-A1FF-3CBE33044661\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484FC127-05CB-423F-8CEE-C442ABEBC7E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB1063F-5264-4036-A2C0-4473E9E5119C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03C008C-2705-42DC-9BC4-DF1414F536A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005989E4-6826-46D8-AEFA-3B07FB6EF31C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95702F66-17CF-4C92-AF63-CD7A8A54A351\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303F661B-45E9-4AC1-9B98-62E4D705102D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1582461F-9752-43C5-A2E2-099956D94341\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4A79BA-E498-4819-96C5-3D607A2727DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA058E5-3CB8-4C30-AE22-3B6759A5F905\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856830B6-6EAF-483C-91FD-940EC248E533\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8A44FC-9790-4202-80BE-203AD0E86E15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD598982-D2BE-4313-85A7-A2169C08A288\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132192AC-BC59-4C61-B826-F91A82956437\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAFF906F-6379-4BFF-8E23-A9AC9AE443DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684F36CB-2355-45F5-B6E1-7157CA9225D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94221075-DD47-45FD-8A2A-D364573FFDF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192EE6CF-0494-458F-96EF-311FB6076AAF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572B9A2B-F23D-4EFE-8ACC-3D8357158D02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"382DA0A9-0ADF-4ECC-AF71-CE021DC8B359\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE43349A-246E-45E9-8CD5-E417DB270445\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A86733-31A4-4146-9539-01883B0D315A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D99997-1389-493E-BDEA-9904A46E48EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC97F277-4BFD-41D7-A205-631C6FBE8DAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC4654E-519B-4412-B551-F2436108152B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54611A05-BCA3-495A-8CDB-946FF47E0333\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38997E8B-D2B7-4AB2-BB6E-33966511AF38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99E921-4023-4E28-BAB7-A830487B3850\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454A72B-76EC-46D9-8675-97DC076D7615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F74102-CBC1-4BB8-80A7-A2DCB6F4239A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AE0210-F156-42BA-AAD5-177A2E845A4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978DF75D-F7B7-40F6-8054-9551306106F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F67023B-114D-46FC-A26B-23E2BAB8DD61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60123EE-1B7B-4430-8B01-0591F31D54D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F54EB87-09B7-4E80-A646-5284B884B059\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DDA64FE-29DE-4A7B-82D0-D409B38BB67A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E157B59-9642-457B-BB3C-FBA629F43CBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD38BB02-752E-44C8-B878-FF7D4E95B452\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FAEA47-94A3-4C5A-9A6E-4E47A42BA130\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6AC60D3-EE6C-46A3-8068-158D83995BD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1811B5C7-013C-4965-AB2E-B0A089605E42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE7A27E-1900-4D51-B5F8-9C243CF3E544\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A82FC5-5646-47B7-B6BB-84A374DFD864\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9E0845-FB81-47FC-B083-D7A76AA49D14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE02F8EE-421E-4487-8C91-AB2880C7056B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6317AB4-E945-4BF6-A11B-7D076AEF74A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF86B7B-4028-41C7-938E-8F299568CB19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88E56678-04A0-447E-BC96-0CF73A340C9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E33072D-4807-4803-83EA-90D0A721B835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7947AC99-3250-46C6-8C92-382F8956B39B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540041FD-F241-4EA4-BBBC-16B28449779A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0464E67E-DC8F-48CB-BA80-B3E3B7EC835F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E04BD-4B95-4513-B832-30DF5332B77E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA61ADB-2FEA-459A-BF4F-C55401479107\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C5C135-D432-4AEC-BB40-01FDA6A6E995\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF5F66-636C-4637-96F7-0FA45BB7C64B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5F3921-FA39-4896-8546-DE603A70374A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE640-381F-449B-ACB1-F1BD255683C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6512668F-EEFB-4654-AE7F-9F71F89F3B65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC4BECA-6023-4225-9685-937E47C67C1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031C2DA9-0E24-450C-B57A-DC7C519D5F47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D2C602-8086-4FC4-AE89-0842A453E56E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8198CED9-216C-4573-B766-B6CDB3E6F7CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D777E18-B7ED-42CF-A2C4-87426B04E8EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237AB35F-1702-418D-8193-F8B387B7F644\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62878C38-D2E3-452E-98FF-2ED2B6C256B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5EE04-23BC-48E6-A171-D63C8258E317\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B75781D-051F-44C1-B79F-1C32AFECFF65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D7F33C-F522-4A20-9055-1662178D7F27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78AB5531-B88E-478C-A723-ADAE3E0C87F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBF39F8-2317-432A-846D-7FEC2C35EEE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2093BCDB-70F3-4D90-B899-B2801F8A6059\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F24782C-DBE2-488F-B935-49B4A8BC1E29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9825AB7C-7675-4364-BCE3-4C63BD41780A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02B85FAD-49E4-4DE4-BF8B-88F3C9772779\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B1F092-A9EA-4245-A154-2DFEA5D2A01F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFDD574D-1799-4386-A906-705DC2F0978F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9B37D9-8A56-4058-9AFF-3BE64D95CC23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0359E9DA-5BC0-48FD-962C-34358691E7DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937E2FA2-BED8-48FF-8D01-153D4039F224\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936CD5C8-F583-40AB-A9F1-81CADD0CEF42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A45A30A-6857-419E-8816-7EC9F8C8FEF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D814C2A-D794-46A8-9A06-CC4DB387176F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA963063-2CBC-4CF4-8DD9-47A9448C6FBC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFCD485-4013-48A4-8D88-F5D53BAC9065\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27AC88BB-3495-4B0D-8C3F-8E6C46304E2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F0D63B0-369D-4337-AC25-F0851C0C15C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14B4470-CF19-40F0-A765-08BA391F0E45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D640C5C-C906-41A2-96BC-19299ADB9446\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD852DB5-720F-473E-99EB-F037E81AA567\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0005355A-DA7A-417D-8AF9-F6CC880040BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F5D1C5-6AAE-4226-A627-9F37D7131102\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755801C1-7058-4584-BB7B-BE2BF9D5B78B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59172BDD-6177-4E6E-B9D7-C453EB1D651A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492017EE-C13F-4C40-887F-9C3C9F439898\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BBC2B42-DEBE-4696-928A-353F48FA9546\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BEC933-8C69-4E47-B527-DA3ED3233B2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EF33521-012B-45BC-A860-7A5ADAB74488\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D1E9A6F-7339-4679-B83B-87BC1BEEFA16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE6D732-6F55-4130-B95A-01ACC6EAB85F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474D45CF-EBBE-4013-B8EC-BCA3293B36B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC61EAFD-15EA-427B-8419-E6EB2BCD78CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D70D28B-809E-456C-96ED-84A4CA7EC942\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68244A90-6F59-4960-BB91-F2B8A745E2BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"954500F1-6466-4A1C-8E0C-D759121CEBDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F6F176F-78BA-4E92-8C3E-0B7C7018F265\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E839C5C6-5544-4976-9AE7-55AADA09A48E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA92163-5A72-4271-89D4-401C24950F62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738B7B07-8F15-4DCD-A361-70C1FF9CB4EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E02A9C95-DF12-4816-88C3-6AFC331B8426\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1031085D-AD15-4124-803E-9B742E7484A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808C582D-4F80-4378-B177-012EEF438443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337E685C-4B65-441C-AD06-E8374CC39450\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DA33B2-B942-447F-9229-A41808411F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610909ED-A636-4007-A50F-500057340E70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1498B525-660E-4D96-B723-FBDB65684F0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B92B63F-3C30-4C00-9734-37CCA865FED9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49CEC694-DF98-47C7-8C7B-0A26EDC413BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4847AB9-1A77-46BD-9236-FE8FFC4670B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B4FEA-CFB2-429C-818B-9277B6D546C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE35B376-F439-428B-A299-CBEEE0BEFF3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"014AE81A-ACEE-4E0A-A3FF-412DF86AE00C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FB895BB-AEA5-4A4E-A9DE-EAD48656187D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB8E11E-5816-4ABB-849F-E10C1CFB39ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08A2432-6FCE-4579-89FE-EB0348F1BE8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D64F03-2F90-490B-844B-5F0F08B49294\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C952A84-3DA2-448F-85AC-573C270C312D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C8CF00-8FC8-4206-9028-6F104699DE76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B0CC20-FF43-4341-90BE-FA365CC4E53B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE69C69-9D13-4DF9-A5F2-69435598CA8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED76988B-0245-4C25-876C-CACC57B04B8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE5D42-1C62-4381-89E0-8F3264F696EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8480358-5313-4308-90F7-F93D9B11C66C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168076CD-1E6D-4328-AB59-4C1A90735AC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16540EDF-3CC7-4E51-9E67-1A530330C951\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A05BAA-D9ED-411D-AEC7-DBD8998C345E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73789139-3498-4ED8-A80C-A8794BC176A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE409172-E478-4557-977E-8EDF016F061D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99075640-17C5-47EA-B9B5-FE72BA9C62C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D489967C-CD37-44C3-B8DB-7B813562909F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB83D414-FD6D-4502-B487-F0D00DAD3972\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D964031-15E2-461B-BC1B-213EF720E720\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77566843-4A30-441F-8FBA-7D3C76907BB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A18D2F3-39A4-4D1E-963E-6D5BF93615FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52817B56-DC1B-46C7-9F86-AE2E7328B7A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9921332-9BAE-4D93-A2FD-576D9BA72408\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8915EEB-7957-4145-B9CF-DEFDD2D613F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BBC3B4-BD63-4895-AE29-E59396806AA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82315CD-2E07-4BDE-9A9F-D06640680D76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A14E26-5950-4B06-8AEE-5FF03415F4DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955DF45C-0F81-4EE8-B7E2-0687122253AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00715133-F99C-49F2-9B0B-16D2F15E4D49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71C2E30-E155-49B8-B90F-F9844A25C155\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B3C659-C31A-4F82-9587-9F8A943F637D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F37AAF-A618-46C3-9C49-4B6CD9BDA830\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FAAD8C-6DD1-408D-849B-0CE707321B13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC216C0-16D7-4DF0-A5C4-A952E4916925\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02B1C69-BAA4-485B-BE22-46BE321F9E4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929A1953-903C-4B1D-B148-88E5A2F500BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B309264-F40F-4DEF-BBDB-1CC96E903EA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"849E6D95-C3A8-457E-90D9-34ECAE5D1519\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE52C09-8D8C-4D93-BCF7-4C53728FDA49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A481233E-C479-4715-BB6C-CA5BCD6E3AD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D58FB5-0093-4487-8506-8430ED650258\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0100D1-E4CF-4062-A260-D707845BF81A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00718CCC-EE1B-4365-B1C0-E92D6662D9DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0546350C-6DF6-43AC-8439-578D2D292C09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B016179A-6567-497E-9756-3B8EEC7FC1EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07E922F-C1AB-469C-A1C1-9F9E58332DFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74293FA6-D960-451F-A071-68F2E2AE86CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE347B8-4B81-4332-ADFA-8A19D62D40D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4E052F-4883-4F6B-87B8-CFC432525948\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180B3002-B3C5-48B5-8322-5B64B237C5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"609C4E3C-CFA6-43BC-8E9D-852E518B08D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83955DFE-A91C-424A-AA6D-785964C97C09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8505FAC6-A96D-4788-B23F-960D5AB533C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8502D97B-8208-431B-B350-32504B904816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B48649-1E70-49CC-8E1A-5262B58A43B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/10/2\",\"source\":\"psirt@amd.com\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://security.gentoo.org/glsa/202402-07\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040\",\"source\":\"psirt@amd.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5378\",\"source\":\"psirt@amd.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/10/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202402-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5378\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
suse-su-2023:0136-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-136,SUSE-OpenStack-Cloud-9-2023-136,SUSE-OpenStack-Cloud-Crowbar-9-2023-136,SUSE-SLE-SAP-12-SP4-2023-136,SUSE-SLE-SERVER-12-SP4-LTSS-2023-136",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0136-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0136-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230136-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0136-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-01-25T10:20:51Z",
"generator": {
"date": "2023-01-25T10:20:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0136-1",
"initial_release_date": "2023-01-25T10:20:51Z",
"revision_history": [
{
"date": "2023-01-25T10:20:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.11.4_36-2.86.1.aarch64",
"product": {
"name": "xen-4.11.4_36-2.86.1.aarch64",
"product_id": "xen-4.11.4_36-2.86.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.11.4_36-2.86.1.aarch64",
"product": {
"name": "xen-devel-4.11.4_36-2.86.1.aarch64",
"product_id": "xen-devel-4.11.4_36-2.86.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.11.4_36-2.86.1.aarch64",
"product": {
"name": "xen-doc-html-4.11.4_36-2.86.1.aarch64",
"product_id": "xen-doc-html-4.11.4_36-2.86.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.11.4_36-2.86.1.aarch64",
"product": {
"name": "xen-libs-4.11.4_36-2.86.1.aarch64",
"product_id": "xen-libs-4.11.4_36-2.86.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.11.4_36-2.86.1.aarch64",
"product": {
"name": "xen-tools-4.11.4_36-2.86.1.aarch64",
"product_id": "xen-tools-4.11.4_36-2.86.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.11.4_36-2.86.1.aarch64",
"product": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.aarch64",
"product_id": "xen-tools-domU-4.11.4_36-2.86.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.11.4_36-2.86.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.11.4_36-2.86.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.11.4_36-2.86.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.11.4_36-2.86.1.i586",
"product": {
"name": "xen-devel-4.11.4_36-2.86.1.i586",
"product_id": "xen-devel-4.11.4_36-2.86.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.11.4_36-2.86.1.i586",
"product": {
"name": "xen-libs-4.11.4_36-2.86.1.i586",
"product_id": "xen-libs-4.11.4_36-2.86.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.11.4_36-2.86.1.i586",
"product": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.i586",
"product_id": "xen-tools-domU-4.11.4_36-2.86.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-4.11.4_36-2.86.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-devel-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-devel-4.11.4_36-2.86.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-doc-html-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-doc-html-4.11.4_36-2.86.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-libs-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-libs-4.11.4_36-2.86.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-tools-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-tools-4.11.4_36-2.86.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"product": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"product_id": "xen-tools-domU-4.11.4_36-2.86.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
},
"product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-01-25T10:20:51Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
suse-su-2023:0169-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n\nNon-security fixes:\n\n- Updated to version 4.16.3 (bsc#1027519).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-169,SUSE-SLE-Micro-5.3-2023-169,SUSE-SLE-Module-Basesystem-15-SP4-2023-169,SUSE-SLE-Module-Server-Applications-15-SP4-2023-169,openSUSE-Leap-Micro-5.3-2023-169,openSUSE-SLE-15.4-2023-169",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0169-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0169-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230169-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0169-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-01-26T17:30:00Z",
"generator": {
"date": "2023-01-26T17:30:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0169-1",
"initial_release_date": "2023-01-26T17:30:00Z",
"revision_history": [
{
"date": "2023-01-26T17:30:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.3_02-150400.4.19.1.aarch64",
"product": {
"name": "xen-4.16.3_02-150400.4.19.1.aarch64",
"product_id": "xen-4.16.3_02-150400.4.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.3_02-150400.4.19.1.aarch64",
"product": {
"name": "xen-devel-4.16.3_02-150400.4.19.1.aarch64",
"product_id": "xen-devel-4.16.3_02-150400.4.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64",
"product": {
"name": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64",
"product_id": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.3_02-150400.4.19.1.aarch64",
"product": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.aarch64",
"product_id": "xen-libs-4.16.3_02-150400.4.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.3_02-150400.4.19.1.aarch64",
"product": {
"name": "xen-tools-4.16.3_02-150400.4.19.1.aarch64",
"product_id": "xen-tools-4.16.3_02-150400.4.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64",
"product": {
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64",
"product_id": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.16.3_02-150400.4.19.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.16.3_02-150400.4.19.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.16.3_02-150400.4.19.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.16.3_02-150400.4.19.1.i586",
"product": {
"name": "xen-devel-4.16.3_02-150400.4.19.1.i586",
"product_id": "xen-devel-4.16.3_02-150400.4.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.3_02-150400.4.19.1.i586",
"product": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.i586",
"product_id": "xen-libs-4.16.3_02-150400.4.19.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.i586",
"product": {
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.i586",
"product_id": "xen-tools-domU-4.16.3_02-150400.4.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-4.16.3_02-150400.4.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-devel-4.16.3_02-150400.4.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-libs-4.16.3_02-150400.4.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-tools-4.16.3_02-150400.4.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"product": {
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"product_id": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64"
},
"product_reference": "xen-4.16.3_02-150400.4.19.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64"
},
"product_reference": "xen-devel-4.16.3_02-150400.4.19.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64"
},
"product_reference": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64"
},
"product_reference": "xen-libs-4.16.3_02-150400.4.19.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64"
},
"product_reference": "xen-tools-4.16.3_02-150400.4.19.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64"
},
"product_reference": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64"
},
"product_reference": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch",
"openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-01-26T17:30:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
suse-su-2023:0170-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-170,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-170,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-170,SUSE-SLE-Product-RT-15-SP3-2023-170,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-170,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-170,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-170,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-170,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-170,SUSE-SUSE-MicroOS-5.1-2023-170,SUSE-SUSE-MicroOS-5.2-2023-170,SUSE-Storage-7.1-2023-170,openSUSE-Leap-Micro-5.2-2023-170",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0170-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0170-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230170-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0170-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-01-26T17:30:23Z",
"generator": {
"date": "2023-01-26T17:30:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0170-1",
"initial_release_date": "2023-01-26T17:30:23Z",
"revision_history": [
{
"date": "2023-01-26T17:30:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.14.5_10-150300.3.45.1.aarch64",
"product": {
"name": "xen-4.14.5_10-150300.3.45.1.aarch64",
"product_id": "xen-4.14.5_10-150300.3.45.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.14.5_10-150300.3.45.1.aarch64",
"product": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.aarch64",
"product_id": "xen-devel-4.14.5_10-150300.3.45.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.14.5_10-150300.3.45.1.aarch64",
"product": {
"name": "xen-doc-html-4.14.5_10-150300.3.45.1.aarch64",
"product_id": "xen-doc-html-4.14.5_10-150300.3.45.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.5_10-150300.3.45.1.aarch64",
"product": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.aarch64",
"product_id": "xen-libs-4.14.5_10-150300.3.45.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.14.5_10-150300.3.45.1.aarch64",
"product": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.aarch64",
"product_id": "xen-tools-4.14.5_10-150300.3.45.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.aarch64",
"product": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.aarch64",
"product_id": "xen-tools-domU-4.14.5_10-150300.3.45.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.14.5_10-150300.3.45.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.14.5_10-150300.3.45.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.14.5_10-150300.3.45.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.14.5_10-150300.3.45.1.i586",
"product": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.i586",
"product_id": "xen-devel-4.14.5_10-150300.3.45.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.5_10-150300.3.45.1.i586",
"product": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.i586",
"product_id": "xen-libs-4.14.5_10-150300.3.45.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.i586",
"product": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.i586",
"product_id": "xen-tools-domU-4.14.5_10-150300.3.45.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-4.14.5_10-150300.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-devel-4.14.5_10-150300.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-doc-html-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-doc-html-4.14.5_10-150300.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-libs-4.14.5_10-150300.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-libs-32bit-4.14.5_10-150300.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-tools-4.14.5_10-150300.3.45.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"product": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"product_id": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3",
"product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Manager Retail Branch Server 4.2",
"product_id": "SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
},
"product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64",
"SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch",
"openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-01-26T17:30:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
suse-su-2023:0186-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-186,SUSE-SLE-SERVER-12-SP2-BCL-2023-186",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0186-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0186-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230186-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0186-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-01-27T10:26:43Z",
"generator": {
"date": "2023-01-27T10:26:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0186-1",
"initial_release_date": "2023-01-27T10:26:43Z",
"revision_history": [
{
"date": "2023-01-27T10:26:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.6_30-43.101.1.aarch64",
"product": {
"name": "xen-4.7.6_30-43.101.1.aarch64",
"product_id": "xen-4.7.6_30-43.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.7.6_30-43.101.1.aarch64",
"product": {
"name": "xen-devel-4.7.6_30-43.101.1.aarch64",
"product_id": "xen-devel-4.7.6_30-43.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.6_30-43.101.1.aarch64",
"product": {
"name": "xen-doc-html-4.7.6_30-43.101.1.aarch64",
"product_id": "xen-doc-html-4.7.6_30-43.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.6_30-43.101.1.aarch64",
"product": {
"name": "xen-libs-4.7.6_30-43.101.1.aarch64",
"product_id": "xen-libs-4.7.6_30-43.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.6_30-43.101.1.aarch64",
"product": {
"name": "xen-tools-4.7.6_30-43.101.1.aarch64",
"product_id": "xen-tools-4.7.6_30-43.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.6_30-43.101.1.aarch64",
"product": {
"name": "xen-tools-domU-4.7.6_30-43.101.1.aarch64",
"product_id": "xen-tools-domU-4.7.6_30-43.101.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.7.6_30-43.101.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.7.6_30-43.101.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.7.6_30-43.101.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.7.6_30-43.101.1.i586",
"product": {
"name": "xen-devel-4.7.6_30-43.101.1.i586",
"product_id": "xen-devel-4.7.6_30-43.101.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.6_30-43.101.1.i586",
"product": {
"name": "xen-libs-4.7.6_30-43.101.1.i586",
"product_id": "xen-libs-4.7.6_30-43.101.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.6_30-43.101.1.i586",
"product": {
"name": "xen-tools-domU-4.7.6_30-43.101.1.i586",
"product_id": "xen-tools-domU-4.7.6_30-43.101.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-4.7.6_30-43.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-devel-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-devel-4.7.6_30-43.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-doc-html-4.7.6_30-43.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-libs-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-libs-4.7.6_30-43.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-tools-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-tools-4.7.6_30-43.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.6_30-43.101.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.6_30-43.101.1.x86_64",
"product_id": "xen-tools-domU-4.7.6_30-43.101.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64"
},
"product_reference": "xen-4.7.6_30-43.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.6_30-43.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64"
},
"product_reference": "xen-libs-4.7.6_30-43.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64"
},
"product_reference": "xen-tools-4.7.6_30-43.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.6_30-43.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-01-27T10:26:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
suse-su-2023:0672-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-672,SUSE-SLE-SDK-12-SP5-2023-672,SUSE-SLE-SERVER-12-SP5-2023-672",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0672-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0672-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230672-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0672-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-03-08T12:17:10Z",
"generator": {
"date": "2023-03-08T12:17:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0672-1",
"initial_release_date": "2023-03-08T12:17:10Z",
"revision_history": [
{
"date": "2023-03-08T12:17:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_32-3.85.4.aarch64",
"product": {
"name": "xen-4.12.4_32-3.85.4.aarch64",
"product_id": "xen-4.12.4_32-3.85.4.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_32-3.85.4.aarch64",
"product": {
"name": "xen-devel-4.12.4_32-3.85.4.aarch64",
"product_id": "xen-devel-4.12.4_32-3.85.4.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_32-3.85.4.aarch64",
"product": {
"name": "xen-doc-html-4.12.4_32-3.85.4.aarch64",
"product_id": "xen-doc-html-4.12.4_32-3.85.4.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_32-3.85.4.aarch64",
"product": {
"name": "xen-libs-4.12.4_32-3.85.4.aarch64",
"product_id": "xen-libs-4.12.4_32-3.85.4.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_32-3.85.4.aarch64",
"product": {
"name": "xen-tools-4.12.4_32-3.85.4.aarch64",
"product_id": "xen-tools-4.12.4_32-3.85.4.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_32-3.85.4.aarch64",
"product": {
"name": "xen-tools-domU-4.12.4_32-3.85.4.aarch64",
"product_id": "xen-tools-domU-4.12.4_32-3.85.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.12.4_32-3.85.4.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.12.4_32-3.85.4.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.12.4_32-3.85.4.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.12.4_32-3.85.4.i586",
"product": {
"name": "xen-devel-4.12.4_32-3.85.4.i586",
"product_id": "xen-devel-4.12.4_32-3.85.4.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_32-3.85.4.i586",
"product": {
"name": "xen-libs-4.12.4_32-3.85.4.i586",
"product_id": "xen-libs-4.12.4_32-3.85.4.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_32-3.85.4.i586",
"product": {
"name": "xen-tools-domU-4.12.4_32-3.85.4.i586",
"product_id": "xen-tools-domU-4.12.4_32-3.85.4.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-4.12.4_32-3.85.4.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-devel-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-devel-4.12.4_32-3.85.4.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-doc-html-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-doc-html-4.12.4_32-3.85.4.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-libs-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-libs-4.12.4_32-3.85.4.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-tools-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-tools-4.12.4_32-3.85.4.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"product": {
"name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"product_id": "xen-tools-domU-4.12.4_32-3.85.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_32-3.85.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64"
},
"product_reference": "xen-devel-4.12.4_32-3.85.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-devel-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-doc-html-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-libs-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-tools-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-doc-html-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-libs-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-tools-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-03-08T12:17:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
suse-su-2023:0214-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-214,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-214,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-214,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-214,SUSE-Storage-7-2023-214",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0214-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0214-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230214-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0214-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-01-30T16:27:15Z",
"generator": {
"date": "2023-01-30T16:27:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0214-1",
"initial_release_date": "2023-01-30T16:27:15Z",
"revision_history": [
{
"date": "2023-01-30T16:27:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.13.4_18-150200.3.68.1.aarch64",
"product": {
"name": "xen-4.13.4_18-150200.3.68.1.aarch64",
"product_id": "xen-4.13.4_18-150200.3.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.13.4_18-150200.3.68.1.aarch64",
"product": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.aarch64",
"product_id": "xen-devel-4.13.4_18-150200.3.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.13.4_18-150200.3.68.1.aarch64",
"product": {
"name": "xen-doc-html-4.13.4_18-150200.3.68.1.aarch64",
"product_id": "xen-doc-html-4.13.4_18-150200.3.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.13.4_18-150200.3.68.1.aarch64",
"product": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.aarch64",
"product_id": "xen-libs-4.13.4_18-150200.3.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.13.4_18-150200.3.68.1.aarch64",
"product": {
"name": "xen-tools-4.13.4_18-150200.3.68.1.aarch64",
"product_id": "xen-tools-4.13.4_18-150200.3.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.aarch64",
"product": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.aarch64",
"product_id": "xen-tools-domU-4.13.4_18-150200.3.68.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.13.4_18-150200.3.68.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.13.4_18-150200.3.68.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.13.4_18-150200.3.68.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.13.4_18-150200.3.68.1.i586",
"product": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.i586",
"product_id": "xen-devel-4.13.4_18-150200.3.68.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.13.4_18-150200.3.68.1.i586",
"product": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.i586",
"product_id": "xen-libs-4.13.4_18-150200.3.68.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.i586",
"product": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.i586",
"product_id": "xen-tools-domU-4.13.4_18-150200.3.68.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-4.13.4_18-150200.3.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-devel-4.13.4_18-150200.3.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-doc-html-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-doc-html-4.13.4_18-150200.3.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-libs-4.13.4_18-150200.3.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-libs-32bit-4.13.4_18-150200.3.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-tools-4.13.4_18-150200.3.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"product": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"product_id": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64"
},
"product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-01-30T16:27:15Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
suse-su-2023:0154-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-154,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-154,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-154,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-154,SUSE-Storage-6-2023-154",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0154-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:0154-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230154-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:0154-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html"
},
{
"category": "self",
"summary": "SUSE Bug 1205209",
"url": "https://bugzilla.suse.com/1205209"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23824 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23824/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-01-26T14:46:10Z",
"generator": {
"date": "2023-01-26T14:46:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:0154-1",
"initial_release_date": "2023-01-26T14:46:10Z",
"revision_history": [
{
"date": "2023-01-26T14:46:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_32-150100.3.83.1.aarch64",
"product": {
"name": "xen-4.12.4_32-150100.3.83.1.aarch64",
"product_id": "xen-4.12.4_32-150100.3.83.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_32-150100.3.83.1.aarch64",
"product": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.aarch64",
"product_id": "xen-devel-4.12.4_32-150100.3.83.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_32-150100.3.83.1.aarch64",
"product": {
"name": "xen-doc-html-4.12.4_32-150100.3.83.1.aarch64",
"product_id": "xen-doc-html-4.12.4_32-150100.3.83.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_32-150100.3.83.1.aarch64",
"product": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.aarch64",
"product_id": "xen-libs-4.12.4_32-150100.3.83.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_32-150100.3.83.1.aarch64",
"product": {
"name": "xen-tools-4.12.4_32-150100.3.83.1.aarch64",
"product_id": "xen-tools-4.12.4_32-150100.3.83.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.aarch64",
"product": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.aarch64",
"product_id": "xen-tools-domU-4.12.4_32-150100.3.83.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.12.4_32-150100.3.83.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.12.4_32-150100.3.83.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.12.4_32-150100.3.83.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.12.4_32-150100.3.83.1.i586",
"product": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.i586",
"product_id": "xen-devel-4.12.4_32-150100.3.83.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_32-150100.3.83.1.i586",
"product": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.i586",
"product_id": "xen-libs-4.12.4_32-150100.3.83.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.i586",
"product": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.i586",
"product_id": "xen-tools-domU-4.12.4_32-150100.3.83.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-4.12.4_32-150100.3.83.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-devel-4.12.4_32-150100.3.83.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-doc-html-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-doc-html-4.12.4_32-150100.3.83.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-libs-4.12.4_32-150100.3.83.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-libs-32bit-4.12.4_32-150100.3.83.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-tools-4.12.4_32-150100.3.83.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"product": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"product_id": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23824"
}
],
"notes": [
{
"category": "general",
"text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23824",
"url": "https://www.suse.com/security/cve/CVE-2022-23824"
},
{
"category": "external",
"summary": "SUSE Bug 1205209 for CVE-2022-23824",
"url": "https://bugzilla.suse.com/1205209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-01-26T14:46:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-23824"
}
]
}
ghsa-hhhj-6x4j-w995
Vulnerability from github
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
{
"affected": [],
"aliases": [
"CVE-2022-23824"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-11-09T21:15:00Z",
"severity": "MODERATE"
},
"details": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"id": "GHSA-hhhj-6x4j-w995",
"modified": "2022-11-15T12:00:21Z",
"published": "2022-11-10T12:01:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23824"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202402-07"
},
{
"type": "WEB",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5378"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2022-2001
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Prozessoren sind die zentralen Rechenwerke eines Computers.\r\nXen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in AMD Prozessoren und Xen ausnutzen, um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2001 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2001.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2001 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2001"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0672-1 vom 2023-03-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html"
},
{
"category": "external",
"summary": "AMD Security Bulletin vom 2022-11-08",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"category": "external",
"summary": "Xen Security Advisory vom 2022-11-08",
"url": "https://xenbits.xen.org/xsa/advisory-422.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0136-1 vom 2023-01-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0170-1 vom 2023-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0169-1 vom 2023-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0154-1 vom 2023-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0186-1 vom 2023-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0214-1 vom 2023-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html"
}
],
"source_lang": "en-US",
"title": "AMD Prozessor: Schwachstelle erm\u00f6glicht Offenlegung von Informationen",
"tracking": {
"current_release_date": "2023-03-08T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:37:49.790+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2001",
"initial_release_date": "2022-11-08T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-11-08T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-11-09T23:00:00.000+00:00",
"number": "2",
"summary": "Anpassung"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: FEDORA-2022-53A4A5DD11"
},
{
"date": "2023-01-25T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-29T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-30T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-03-08T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AMD Prozessor",
"product": {
"name": "AMD Prozessor",
"product_id": "T019554",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:-"
}
}
}
],
"category": "vendor",
"name": "AMD"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in AMD Prozessoren und Xen. Diese besteht in der Komponente \"Indirect Branch Prediction Barrier\" welche zum Schutz vor Spectre-Angriffen dienen soll. Diese verh\u00e4lt sich nicht wie vorgesehen und kann es dadurch erm\u00f6glichen Branch Predicitions durchzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T019554",
"T002207",
"T000611"
]
},
"release_date": "2022-11-08T23:00:00.000+00:00",
"title": "CVE-2022-23824"
}
]
}
wid-sec-w-2022-2001
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Prozessoren sind die zentralen Rechenwerke eines Computers.\r\nXen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in AMD Prozessoren und Xen ausnutzen, um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2001 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2001.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2001 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2001"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0672-1 vom 2023-03-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html"
},
{
"category": "external",
"summary": "AMD Security Bulletin vom 2022-11-08",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"category": "external",
"summary": "Xen Security Advisory vom 2022-11-08",
"url": "https://xenbits.xen.org/xsa/advisory-422.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0136-1 vom 2023-01-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0170-1 vom 2023-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0169-1 vom 2023-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0154-1 vom 2023-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0186-1 vom 2023-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0214-1 vom 2023-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html"
}
],
"source_lang": "en-US",
"title": "AMD Prozessor: Schwachstelle erm\u00f6glicht Offenlegung von Informationen",
"tracking": {
"current_release_date": "2023-03-08T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:37:49.790+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2001",
"initial_release_date": "2022-11-08T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-11-08T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-11-09T23:00:00.000+00:00",
"number": "2",
"summary": "Anpassung"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: FEDORA-2022-53A4A5DD11"
},
{
"date": "2023-01-25T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-29T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-01-30T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-03-08T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AMD Prozessor",
"product": {
"name": "AMD Prozessor",
"product_id": "T019554",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:-"
}
}
}
],
"category": "vendor",
"name": "AMD"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23824",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in AMD Prozessoren und Xen. Diese besteht in der Komponente \"Indirect Branch Prediction Barrier\" welche zum Schutz vor Spectre-Angriffen dienen soll. Diese verh\u00e4lt sich nicht wie vorgesehen und kann es dadurch erm\u00f6glichen Branch Predicitions durchzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T019554",
"T002207",
"T000611"
]
},
"release_date": "2022-11-08T23:00:00.000+00:00",
"title": "CVE-2022-23824"
}
]
}
CERTFR-2022-AVI-1012
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code à distance, une élévation de privilèges, un contournement de la fonctionnalité de sécurité, une atteinte à la confidentialité des données et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows Subsystem pour Linux (WSL2) | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows 11 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Sysmon | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 10 Version 21H1 pour systèmes x64 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 pour systèmes x64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows 10 Version 20H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Subsystem pour Linux (WSL2)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Sysmon",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 20H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-41128",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41128"
},
{
"name": "CVE-2022-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38014"
},
{
"name": "CVE-2022-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41039"
},
{
"name": "CVE-2022-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41086"
},
{
"name": "CVE-2022-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41056"
},
{
"name": "CVE-2022-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41045"
},
{
"name": "CVE-2022-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41057"
},
{
"name": "CVE-2022-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41058"
},
{
"name": "CVE-2022-41052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41052"
},
{
"name": "CVE-2022-41054",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41054"
},
{
"name": "CVE-2022-41053",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41053"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-41109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41109"
},
{
"name": "CVE-2022-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41048"
},
{
"name": "CVE-2022-41120",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41120"
},
{
"name": "CVE-2022-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41090"
},
{
"name": "CVE-2022-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41044"
},
{
"name": "CVE-2022-41049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41049"
},
{
"name": "CVE-2022-23824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23824"
},
{
"name": "CVE-2022-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41091"
},
{
"name": "CVE-2022-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41096"
},
{
"name": "CVE-2022-41113",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41113"
},
{
"name": "CVE-2022-41102",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41102"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2022-41098",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41098"
},
{
"name": "CVE-2022-41101",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41101"
},
{
"name": "CVE-2022-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41092"
},
{
"name": "CVE-2022-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41073"
},
{
"name": "CVE-2022-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41050"
},
{
"name": "CVE-2022-41099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41099"
},
{
"name": "CVE-2022-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41047"
},
{
"name": "CVE-2022-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41095"
},
{
"name": "CVE-2022-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38015"
},
{
"name": "CVE-2022-41116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41116"
},
{
"name": "CVE-2022-41118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41118"
},
{
"name": "CVE-2022-41100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41100"
},
{
"name": "CVE-2022-41125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41125"
},
{
"name": "CVE-2022-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37992"
},
{
"name": "CVE-2022-41114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41114"
},
{
"name": "CVE-2022-37966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37966"
},
{
"name": "CVE-2022-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41088"
},
{
"name": "CVE-2022-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41055"
},
{
"name": "CVE-2022-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41097"
},
{
"name": "CVE-2022-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41093"
}
],
"initial_release_date": "2022-11-09T00:00:00",
"last_revision_date": "2022-11-09T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41045 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41045"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41128 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41090 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41090"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-37992 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37992"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-37967 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41057 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41057"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-38023 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41058 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41058"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41047 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41047"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41055 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41055"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41054 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41054"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41039 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41039"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-23824 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23824"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41053 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41053"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41099 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41097 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41097"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41073 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41073"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41095 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41095"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41125 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41125"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-38014 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38014"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41056 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41056"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-37966 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41100 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41100"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41088 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41088"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41086 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41086"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41049 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41049"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-38015 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38015"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41048 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41048"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41050 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41050"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41052 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41052"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41102 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41102"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41098 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41098"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41116 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41116"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41120 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41120"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41096 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41096"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41114 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41114"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41092 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41101 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41101"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41093 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41093"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41044 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41044"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41109 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41109"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41118 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41118"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41113 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41113"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41091 du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41091"
}
],
"reference": "CERTFR-2022-AVI-1012",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code \u00e0 distance, une \u00e9l\u00e9vation de\nprivil\u00e8ges, un contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 08 novembre 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2022-AVI-1018
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Xen. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Xen versions xen-unstable antérieures à xsa422/xsa422-x.patch
- Xen versions Xen 4.16.x antérieures à xsa422/xsa422-4.16-x.patch
- Xen versions Xen 4.15.x antérieures à xsa422/xsa422-4.15-x.patch
- Xen versions Xen 4.14.x antérieures à xsa422/xsa422-4.14-x.patch
- Xen versions Xen 4.13.x antérieures à xsa422/xsa422-4.13-x.patch
Seulement les processeurs AMD ainsi que certaines microarchitectures sont affectés par cette vulnérabilité.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eXen versions xen-unstable ant\u00e9rieures \u00e0 xsa422/xsa422-x.patch\u003c/li\u003e \u003cli\u003eXen versions Xen 4.16.x ant\u00e9rieures \u00e0 xsa422/xsa422-4.16-x.patch\u003c/li\u003e \u003cli\u003eXen versions Xen 4.15.x ant\u00e9rieures \u00e0 xsa422/xsa422-4.15-x.patch\u003c/li\u003e \u003cli\u003eXen versions Xen 4.14.x ant\u00e9rieures \u00e0 xsa422/xsa422-4.14-x.patch\u003c/li\u003e \u003cli\u003eXen versions Xen 4.13.x ant\u00e9rieures \u00e0 xsa422/xsa422-4.13-x.patch\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSeulement les processeurs AMD ainsi que certaines microarchitectures sont affect\u00e9s par cette vuln\u00e9rabilit\u00e9.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23824"
}
],
"initial_release_date": "2022-11-10T00:00:00",
"last_revision_date": "2022-11-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-1018",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Xen. Elle permet \u00e0 un attaquant\nde provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen du 08 novembre 2022",
"url": "https://xenbits.xen.org/xsa/advisory-422.html"
}
]
}
fkie_cve-2022-23824
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| psirt@amd.com | http://www.openwall.com/lists/oss-security/2022/11/10/2 | Mailing List, Mitigation, Patch, Third Party Advisory | |
| psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | ||
| psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | ||
| psirt@amd.com | https://security.gentoo.org/glsa/202402-07 | ||
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | Mitigation, Vendor Advisory | |
| psirt@amd.com | https://www.debian.org/security/2023/dsa-5378 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/10/2 | Mailing List, Mitigation, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202402-07 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5378 |
| Vendor | Product | Version | |
|---|---|---|---|
| xen | xen | - | |
| amd | a10-9600p | - | |
| amd | a10-9630p | - | |
| amd | a12-9700p | - | |
| amd | a12-9730p | - | |
| amd | a4-9120 | - | |
| amd | a6-9210 | - | |
| amd | a6-9220 | - | |
| amd | a6-9220c | - | |
| amd | a9-9410 | - | |
| amd | a9-9420 | - | |
| amd | athlon_gold_3150u | - | |
| amd | athlon_silver_3050u | - | |
| amd | athlon_x4_750 | - | |
| amd | athlon_x4_760k | - | |
| amd | athlon_x4_830 | - | |
| amd | athlon_x4_835 | - | |
| amd | athlon_x4_840 | - | |
| amd | athlon_x4_845 | - | |
| amd | athlon_x4_860k | - | |
| amd | athlon_x4_870k | - | |
| amd | athlon_x4_880k | - | |
| amd | athlon_x4_940 | - | |
| amd | athlon_x4_950 | - | |
| amd | athlon_x4_970 | - | |
| amd | epyc_7001 | - | |
| amd | epyc_7002 | - | |
| amd | epyc_7003 | - | |
| amd | epyc_7251 | - | |
| amd | epyc_7252 | - | |
| amd | epyc_7261 | - | |
| amd | epyc_7262 | - | |
| amd | epyc_7272 | - | |
| amd | epyc_7281 | - | |
| amd | epyc_7282 | - | |
| amd | epyc_72f3 | - | |
| amd | epyc_7301 | - | |
| amd | epyc_7302 | - | |
| amd | epyc_7302p | - | |
| amd | epyc_7313 | - | |
| amd | epyc_7313p | - | |
| amd | epyc_7343 | - | |
| amd | epyc_7351 | - | |
| amd | epyc_7351p | - | |
| amd | epyc_7352 | - | |
| amd | epyc_7371 | - | |
| amd | epyc_7373x | - | |
| amd | epyc_7401 | - | |
| amd | epyc_7401p | - | |
| amd | epyc_7402 | - | |
| amd | epyc_7402p | - | |
| amd | epyc_7413 | - | |
| amd | epyc_7443 | - | |
| amd | epyc_7443p | - | |
| amd | epyc_7451 | - | |
| amd | epyc_7452 | - | |
| amd | epyc_7473x | - | |
| amd | epyc_74f3 | - | |
| amd | epyc_7501 | - | |
| amd | epyc_7502 | - | |
| amd | epyc_7502p | - | |
| amd | epyc_7513 | - | |
| amd | epyc_7532 | - | |
| amd | epyc_7542 | - | |
| amd | epyc_7543 | - | |
| amd | epyc_7543p | - | |
| amd | epyc_7551 | - | |
| amd | epyc_7551p | - | |
| amd | epyc_7552 | - | |
| amd | epyc_7573x | - | |
| amd | epyc_75f3 | - | |
| amd | epyc_7601 | - | |
| amd | epyc_7642 | - | |
| amd | epyc_7643 | - | |
| amd | epyc_7662 | - | |
| amd | epyc_7663 | - | |
| amd | epyc_7702 | - | |
| amd | epyc_7713 | - | |
| amd | epyc_7713p | - | |
| amd | epyc_7742 | - | |
| amd | epyc_7763 | - | |
| amd | epyc_7773x | - | |
| amd | epyc_7f32 | - | |
| amd | epyc_7f52 | - | |
| amd | epyc_7f72 | - | |
| amd | epyc_7h12 | - | |
| amd | ryzen_3_2200u | - | |
| amd | ryzen_3_2300u | - | |
| amd | ryzen_3_3100 | - | |
| amd | ryzen_3_3200u | - | |
| amd | ryzen_3_3250u | - | |
| amd | ryzen_3_3300g | - | |
| amd | ryzen_3_3300u | - | |
| amd | ryzen_3_3300x | - | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_3_4300u | - | |
| amd | ryzen_3_5125c | - | |
| amd | ryzen_3_5400u | - | |
| amd | ryzen_3_5425c | - | |
| amd | ryzen_3_5425u | - | |
| amd | ryzen_5_2500u | - | |
| amd | ryzen_5_2600 | - | |
| amd | ryzen_5_2600h | - | |
| amd | ryzen_5_2600x | - | |
| amd | ryzen_5_2700 | - | |
| amd | ryzen_5_2700x | - | |
| amd | ryzen_5_3400g | - | |
| amd | ryzen_5_3450g | - | |
| amd | ryzen_5_3500u | - | |
| amd | ryzen_5_3550h | - | |
| amd | ryzen_5_3580u | - | |
| amd | ryzen_5_3600 | - | |
| amd | ryzen_5_3600x | - | |
| amd | ryzen_5_3600xt | - | |
| amd | ryzen_5_4500u | - | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_5_4600h | - | |
| amd | ryzen_5_4600u | - | |
| amd | ryzen_5_5560u | - | |
| amd | ryzen_5_5600h | - | |
| amd | ryzen_5_5600hs | - | |
| amd | ryzen_5_5600u | - | |
| amd | ryzen_5_5625c | - | |
| amd | ryzen_5_5625u | - | |
| amd | ryzen_7_2700 | - | |
| amd | ryzen_7_2700u | - | |
| amd | ryzen_7_2700x | - | |
| amd | ryzen_7_2800h | - | |
| amd | ryzen_7_3700u | - | |
| amd | ryzen_7_3700x | - | |
| amd | ryzen_7_3750h | - | |
| amd | ryzen_7_3780u | - | |
| amd | ryzen_7_3800x | - | |
| amd | ryzen_7_3800xt | - | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_7_4700u | - | |
| amd | ryzen_7_4800h | - | |
| amd | ryzen_7_4800u | - | |
| amd | ryzen_7_5800h | - | |
| amd | ryzen_7_5800hs | - | |
| amd | ryzen_7_5800u | - | |
| amd | ryzen_7_5825c | - | |
| amd | ryzen_7_5825u | - | |
| amd | ryzen_7_pro_3700u | - | |
| amd | ryzen_9_4900h | - | |
| amd | ryzen_9_5900hs | - | |
| amd | ryzen_9_5900hx | - | |
| amd | ryzen_9_5980hs | - | |
| amd | ryzen_9_5980hx | - | |
| amd | ryzen_threadripper_2920x | - | |
| amd | ryzen_threadripper_2950x | - | |
| amd | ryzen_threadripper_2970wx | - | |
| amd | ryzen_threadripper_2990wx | - | |
| amd | ryzen_threadripper_3960x | - | |
| amd | ryzen_threadripper_3970x | - | |
| amd | ryzen_threadripper_3990x | - | |
| amd | ryzen_threadripper_pro_3795wx | - | |
| amd | ryzen_threadripper_pro_3945wx | - | |
| amd | ryzen_threadripper_pro_3955wx | - | |
| amd | ryzen_threadripper_pro_3995wx | - | |
| amd | ryzen_threadripper_pro_5945wx | - | |
| amd | ryzen_threadripper_pro_5955wx | - | |
| amd | ryzen_threadripper_pro_5965wx | - | |
| amd | ryzen_threadripper_pro_5975wx | - | |
| amd | ryzen_threadripper_pro_5995wx | - | |
| amd | athlon_x4_750_firmware | - | |
| amd | athlon_x4_750 | - | |
| amd | athlon_x4_760k_firmware | - | |
| amd | athlon_x4_760k | - | |
| amd | athlon_x4_830_firmware | - | |
| amd | athlon_x4_830 | - | |
| amd | athlon_x4_835_firmware | - | |
| amd | athlon_x4_835 | - | |
| amd | athlon_x4_840_firmware | - | |
| amd | athlon_x4_840 | - | |
| amd | athlon_x4_845_firmware | - | |
| amd | athlon_x4_845 | - | |
| amd | athlon_x4_860k_firmware | - | |
| amd | athlon_x4_860k | - | |
| amd | athlon_x4_870k_firmware | - | |
| amd | athlon_x4_870k | - | |
| amd | athlon_x4_880k_firmware | - | |
| amd | athlon_x4_880k | - | |
| amd | athlon_x4_940_firmware | - | |
| amd | athlon_x4_940 | - | |
| amd | athlon_x4_950_firmware | - | |
| amd | athlon_x4_950 | - | |
| amd | athlon_x4_970_firmware | - | |
| amd | athlon_x4_970 | - | |
| amd | ryzen_threadripper_pro_3995wx_firmware | - | |
| amd | ryzen_threadripper_pro_3995wx | - | |
| amd | ryzen_threadripper_pro_3795wx_firmware | - | |
| amd | ryzen_threadripper_pro_3795wx | - | |
| amd | ryzen_threadripper_pro_3955wx_firmware | - | |
| amd | ryzen_threadripper_pro_3955wx | - | |
| amd | ryzen_threadripper_pro_3945wx_firmware | - | |
| amd | ryzen_threadripper_pro_3945wx | - | |
| amd | ryzen_threadripper_pro_5955wx_firmware | - | |
| amd | ryzen_threadripper_pro_5955wx | - | |
| amd | ryzen_threadripper_pro_5965wx_firmware | - | |
| amd | ryzen_threadripper_pro_5965wx | - | |
| amd | ryzen_threadripper_pro_5945wx_firmware | - | |
| amd | ryzen_threadripper_pro_5945wx | - | |
| amd | ryzen_threadripper_pro_5975wx_firmware | - | |
| amd | ryzen_threadripper_pro_5975wx | - | |
| amd | ryzen_threadripper_pro_5995wx_firmware | - | |
| amd | ryzen_threadripper_pro_5995wx | - | |
| amd | ryzen_threadripper_2990wx_firmware | - | |
| amd | ryzen_threadripper_2990wx | - | |
| amd | ryzen_threadripper_2970wx_firmware | - | |
| amd | ryzen_threadripper_2970wx | - | |
| amd | ryzen_threadripper_2950x_firmware | - | |
| amd | ryzen_threadripper_2950x | - | |
| amd | ryzen_threadripper_2920x_firmware | - | |
| amd | ryzen_threadripper_2920x | - | |
| amd | ryzen_threadripper_3990x_firmware | - | |
| amd | ryzen_threadripper_3990x | - | |
| amd | ryzen_threadripper_3970x_firmware | - | |
| amd | ryzen_threadripper_3970x | - | |
| amd | ryzen_threadripper_3960x_firmware | - | |
| amd | ryzen_threadripper_3960x | - | |
| amd | a12-9700p_firmware | - | |
| amd | a12-9700p | - | |
| amd | a12-9730p_firmware | - | |
| amd | a12-9730p | - | |
| amd | a10-9600p_firmware | - | |
| amd | a10-9600p | - | |
| amd | a10-9630p_firmware | - | |
| amd | a10-9630p | - | |
| amd | a9-9410_firmware | - | |
| amd | a9-9410 | - | |
| amd | a9-9420_firmware | - | |
| amd | a9-9420 | - | |
| amd | a6-9210_firmware | - | |
| amd | a6-9210 | - | |
| amd | a6-9220_firmware | - | |
| amd | a6-9220 | - | |
| amd | a6-9220c_firmware | - | |
| amd | a6-9220c | - | |
| amd | a4-9120_firmware | - | |
| amd | a4-9120 | - | |
| amd | ryzen_3_2200u_firmware | - | |
| amd | ryzen_3_2200u | - | |
| amd | ryzen_3_2300u_firmware | - | |
| amd | ryzen_3_2300u | - | |
| amd | ryzen_5_2500u_firmware | - | |
| amd | ryzen_5_2500u | - | |
| amd | ryzen_5_2600_firmware | - | |
| amd | ryzen_5_2600 | - | |
| amd | ryzen_5_2600h_firmware | - | |
| amd | ryzen_5_2600h | - | |
| amd | ryzen_5_2600x_firmware | - | |
| amd | ryzen_5_2600x | - | |
| amd | ryzen_5_2700_firmware | - | |
| amd | ryzen_5_2700 | - | |
| amd | ryzen_5_2700x_firmware | - | |
| amd | ryzen_5_2700x | - | |
| amd | ryzen_7_2700_firmware | - | |
| amd | ryzen_7_2700 | - | |
| amd | ryzen_7_2700u_firmware | - | |
| amd | ryzen_7_2700u | - | |
| amd | ryzen_7_2700x_firmware | - | |
| amd | ryzen_7_2700x | - | |
| amd | ryzen_7_2800h_firmware | - | |
| amd | ryzen_7_2800h | - | |
| amd | ryzen_3_3100_firmware | - | |
| amd | ryzen_3_3100 | - | |
| amd | ryzen_3_3200u_firmware | - | |
| amd | ryzen_3_3200u | - | |
| amd | ryzen_3_3250u_firmware | - | |
| amd | ryzen_3_3250u | - | |
| amd | ryzen_3_3300g_firmware | - | |
| amd | ryzen_3_3300g | - | |
| amd | ryzen_3_3300u_firmware | - | |
| amd | ryzen_3_3300u | - | |
| amd | ryzen_3_3300x_firmware | - | |
| amd | ryzen_3_3300x | - | |
| amd | ryzen_5_3400g_firmware | - | |
| amd | ryzen_5_3400g | - | |
| amd | ryzen_5_3450g_firmware | - | |
| amd | ryzen_5_3450g | - | |
| amd | ryzen_5_3500u_firmware | - | |
| amd | ryzen_5_3500u | - | |
| amd | ryzen_5_3550h_firmware | - | |
| amd | ryzen_5_3550h | - | |
| amd | ryzen_5_3600_firmware | - | |
| amd | ryzen_5_3600 | - | |
| amd | ryzen_5_3600x_firmware | - | |
| amd | ryzen_5_3600x | - | |
| amd | ryzen_5_3600xt_firmware | - | |
| amd | ryzen_5_3600xt | - | |
| amd | ryzen_7_3700u_firmware | - | |
| amd | ryzen_7_3700u | - | |
| amd | ryzen_7_3700x_firmware | - | |
| amd | ryzen_7_3700x | - | |
| amd | ryzen_7_3750h_firmware | - | |
| amd | ryzen_7_3750h | - | |
| amd | ryzen_7_3800x_firmware | - | |
| amd | ryzen_7_3800x | - | |
| amd | ryzen_7_3800xt_firmware | - | |
| amd | ryzen_7_3800xt | - | |
| amd | ryzen_5_3580u_firmware | - | |
| amd | ryzen_5_3580u | - | |
| amd | ryzen_7_pro_3700u_firmware | - | |
| amd | ryzen_7_pro_3700u | - | |
| amd | ryzen_7_3780u_firmware | - | |
| amd | ryzen_7_3780u | - | |
| amd | ryzen_7_4700g_firmware | - | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_7_4700ge_firmware | - | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_5_4600g_firmware | - | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_5_4600ge_firmware | - | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_3_4300g_firmware | - | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_3_4300ge_firmware | - | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_9_4900h_firmware | - | |
| amd | ryzen_9_4900h | - | |
| amd | ryzen_7_4800u_firmware | - | |
| amd | ryzen_7_4800u | - | |
| amd | ryzen_7_4700u_firmware | - | |
| amd | ryzen_7_4700u | - | |
| amd | ryzen_7_4800h_firmware | - | |
| amd | ryzen_7_4800h | - | |
| amd | ryzen_5_4600u_firmware | - | |
| amd | ryzen_5_4600u | - | |
| amd | ryzen_5_4500u_firmware | - | |
| amd | ryzen_5_4500u | - | |
| amd | ryzen_5_4600h_firmware | - | |
| amd | ryzen_5_4600h | - | |
| amd | ryzen_3_4300u_firmware | - | |
| amd | ryzen_3_4300u | - | |
| amd | ryzen_9_5980hx_firmware | - | |
| amd | ryzen_9_5980hx | - | |
| amd | ryzen_9_5980hs_firmware | - | |
| amd | ryzen_9_5980hs | - | |
| amd | ryzen_7_5825u_firmware | - | |
| amd | ryzen_7_5825u | - | |
| amd | ryzen_9_5900hx_firmware | - | |
| amd | ryzen_9_5900hx | - | |
| amd | ryzen_9_5900hs_firmware | - | |
| amd | ryzen_9_5900hs | - | |
| amd | ryzen_7_5825c_firmware | - | |
| amd | ryzen_7_5825c | - | |
| amd | ryzen_7_5800h_firmware | - | |
| amd | ryzen_7_5800h | - | |
| amd | ryzen_5_5625u_firmware | - | |
| amd | ryzen_5_5625u | - | |
| amd | ryzen_7_5800hs_firmware | - | |
| amd | ryzen_7_5800hs | - | |
| amd | ryzen_5_5625c_firmware | - | |
| amd | ryzen_5_5625c | - | |
| amd | ryzen_5_5600h_firmware | - | |
| amd | ryzen_5_5600h | - | |
| amd | ryzen_5_5600hs_firmware | - | |
| amd | ryzen_5_5600hs | - | |
| amd | ryzen_7_5800u_firmware | - | |
| amd | ryzen_7_5800u | - | |
| amd | ryzen_5_5600u_firmware | - | |
| amd | ryzen_5_5600u | - | |
| amd | ryzen_5_5560u_firmware | - | |
| amd | ryzen_5_5560u | - | |
| amd | ryzen_3_5425u_firmware | - | |
| amd | ryzen_3_5425u | - | |
| amd | ryzen_3_5425c_firmware | - | |
| amd | ryzen_3_5425c | - | |
| amd | ryzen_3_5400u_firmware | - | |
| amd | ryzen_3_5400u | - | |
| amd | ryzen_3_5125c_firmware | - | |
| amd | ryzen_3_5125c | - | |
| amd | athlon_gold_3150u_firmware | - | |
| amd | athlon_gold_3150u | - | |
| amd | athlon_silver_3050u_firmware | - | |
| amd | athlon_silver_3050u | - | |
| amd | epyc_7001_firmware | - | |
| amd | epyc_7001 | - | |
| amd | epyc_7251_firmware | - | |
| amd | epyc_7251 | - | |
| amd | epyc_7261_firmware | - | |
| amd | epyc_7261 | - | |
| amd | epyc_7281_firmware | - | |
| amd | epyc_7281 | - | |
| amd | epyc_7301_firmware | - | |
| amd | epyc_7301 | - | |
| amd | epyc_7351_firmware | - | |
| amd | epyc_7351 | - | |
| amd | epyc_7351p_firmware | - | |
| amd | epyc_7351p | - | |
| amd | epyc_7371_firmware | - | |
| amd | epyc_7371 | - | |
| amd | epyc_7401_firmware | - | |
| amd | epyc_7401 | - | |
| amd | epyc_7401p_firmware | - | |
| amd | epyc_7401p | - | |
| amd | epyc_7451_firmware | - | |
| amd | epyc_7451 | - | |
| amd | epyc_7501_firmware | - | |
| amd | epyc_7501 | - | |
| amd | epyc_7551_firmware | - | |
| amd | epyc_7551 | - | |
| amd | epyc_7551p_firmware | - | |
| amd | epyc_7551p | - | |
| amd | epyc_7601_firmware | - | |
| amd | epyc_7601 | - | |
| amd | epyc_7002_firmware | - | |
| amd | epyc_7002 | - | |
| amd | epyc_7252_firmware | - | |
| amd | epyc_7252 | - | |
| amd | epyc_7262_firmware | - | |
| amd | epyc_7262 | - | |
| amd | epyc_7272_firmware | - | |
| amd | epyc_7272 | - | |
| amd | epyc_7282_firmware | - | |
| amd | epyc_7282 | - | |
| amd | epyc_7302_firmware | - | |
| amd | epyc_7302 | - | |
| amd | epyc_7302p_firmware | - | |
| amd | epyc_7302p | - | |
| amd | epyc_7352_firmware | - | |
| amd | epyc_7352 | - | |
| amd | epyc_7402_firmware | - | |
| amd | epyc_7402 | - | |
| amd | epyc_7402p_firmware | - | |
| amd | epyc_7402p | - | |
| amd | epyc_7452_firmware | - | |
| amd | epyc_7452 | - | |
| amd | epyc_7502_firmware | - | |
| amd | epyc_7502 | - | |
| amd | epyc_7502p_firmware | - | |
| amd | epyc_7502p | - | |
| amd | epyc_7532_firmware | - | |
| amd | epyc_7532 | - | |
| amd | epyc_7542_firmware | - | |
| amd | epyc_7542 | - | |
| amd | epyc_7552_firmware | - | |
| amd | epyc_7552 | - | |
| amd | epyc_7642_firmware | - | |
| amd | epyc_7642 | - | |
| amd | epyc_7662_firmware | - | |
| amd | epyc_7662 | - | |
| amd | epyc_7702_firmware | - | |
| amd | epyc_7702 | - | |
| amd | epyc_7742_firmware | - | |
| amd | epyc_7742 | - | |
| amd | epyc_7f32_firmware | - | |
| amd | epyc_7f32 | - | |
| amd | epyc_7f52_firmware | - | |
| amd | epyc_7f52 | - | |
| amd | epyc_7f72_firmware | - | |
| amd | epyc_7f72 | - | |
| amd | epyc_7h12_firmware | - | |
| amd | epyc_7h12 | - | |
| amd | epyc_7773x_firmware | - | |
| amd | epyc_7773x | - | |
| amd | epyc_7763_firmware | - | |
| amd | epyc_7763 | - | |
| amd | epyc_7713p_firmware | - | |
| amd | epyc_7713p | - | |
| amd | epyc_7713_firmware | - | |
| amd | epyc_7713 | - | |
| amd | epyc_7663_firmware | - | |
| amd | epyc_7663 | - | |
| amd | epyc_7643_firmware | - | |
| amd | epyc_7643 | - | |
| amd | epyc_75f3_firmware | - | |
| amd | epyc_75f3 | - | |
| amd | epyc_7573x_firmware | - | |
| amd | epyc_7573x | - | |
| amd | epyc_7543p_firmware | - | |
| amd | epyc_7543p | - | |
| amd | epyc_7543_firmware | - | |
| amd | epyc_7543 | - | |
| amd | epyc_7513_firmware | - | |
| amd | epyc_7513 | - | |
| amd | epyc_74f3_firmware | - | |
| amd | epyc_74f3 | - | |
| amd | epyc_7473x_firmware | - | |
| amd | epyc_7473x | - | |
| amd | epyc_7443p_firmware | - | |
| amd | epyc_7443p | - | |
| amd | epyc_7443_firmware | - | |
| amd | epyc_7443 | - | |
| amd | epyc_7413_firmware | - | |
| amd | epyc_7413 | - | |
| amd | epyc_7373x_firmware | - | |
| amd | epyc_7373x | - | |
| amd | epyc_7313_firmware | - | |
| amd | epyc_7313 | - | |
| amd | epyc_7313p_firmware | - | |
| amd | epyc_7313p | - | |
| amd | epyc_7343_firmware | - | |
| amd | epyc_7343 | - | |
| amd | epyc_72f3_firmware | - | |
| amd | epyc_72f3 | - | |
| amd | epyc_7003_firmware | - | |
| amd | epyc_7003 | - | |
| fedoraproject | fedora | 35 | |
| fedoraproject | fedora | 37 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
"matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
"matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "211D05DA-2A44-4FC6-9EE4-8A6D713AC967",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AADD2AB0-D3F7-43BD-A1FF-3CBE33044661",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB1063F-5264-4036-A2C0-4473E9E5119C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03C008C-2705-42DC-9BC4-DF1414F536A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95702F66-17CF-4C92-AF63-CD7A8A54A351",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1582461F-9752-43C5-A2E2-099956D94341",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA058E5-3CB8-4C30-AE22-3B6759A5F905",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "856830B6-6EAF-483C-91FD-940EC248E533",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD598982-D2BE-4313-85A7-A2169C08A288",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFF906F-6379-4BFF-8E23-A9AC9AE443DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94221075-DD47-45FD-8A2A-D364573FFDF5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "572B9A2B-F23D-4EFE-8ACC-3D8357158D02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F67023B-114D-46FC-A26B-23E2BAB8DD61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F54EB87-09B7-4E80-A646-5284B884B059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E157B59-9642-457B-BB3C-FBA629F43CBB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62FAEA47-94A3-4C5A-9A6E-4E47A42BA130",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1811B5C7-013C-4965-AB2E-B0A089605E42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A82FC5-5646-47B7-B6BB-84A374DFD864",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE02F8EE-421E-4487-8C91-AB2880C7056B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF86B7B-4028-41C7-938E-8F299568CB19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E33072D-4807-4803-83EA-90D0A721B835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "540041FD-F241-4EA4-BBBC-16B28449779A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFCD485-4013-48A4-8D88-F5D53BAC9065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
"matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
"matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure."
},
{
"lang": "es",
"value": "IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n."
}
],
"id": "CVE-2022-23824",
"lastModified": "2024-11-21T06:49:19.587",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-09T21:15:13.530",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
},
{
"source": "psirt@amd.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
},
{
"source": "psirt@amd.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
},
{
"source": "psirt@amd.com",
"url": "https://security.gentoo.org/glsa/202402-07"
},
{
"source": "psirt@amd.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"source": "psirt@amd.com",
"url": "https://www.debian.org/security/2023/dsa-5378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202402-07"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2023/dsa-5378"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2022-23824
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-23824",
"id": "GSD-2022-23824",
"references": [
"https://www.suse.com/security/cve/CVE-2022-23824.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-23824"
],
"details": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.",
"id": "GSD-2022-23824",
"modified": "2023-12-13T01:19:35.192023Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"ID": "CVE-2022-23824",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AMD Processors",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Processor various "
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NA"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"name": "http://www.openwall.com/lists/oss-security/2022/11/10/2",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
},
{
"name": "https://www.debian.org/security/2023/dsa-5378",
"refsource": "MISC",
"url": "https://www.debian.org/security/2023/dsa-5378"
},
{
"name": "https://security.gentoo.org/glsa/202402-07",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202402-07"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
"matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
"matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "211D05DA-2A44-4FC6-9EE4-8A6D713AC967",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AADD2AB0-D3F7-43BD-A1FF-3CBE33044661",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB1063F-5264-4036-A2C0-4473E9E5119C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03C008C-2705-42DC-9BC4-DF1414F536A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95702F66-17CF-4C92-AF63-CD7A8A54A351",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1582461F-9752-43C5-A2E2-099956D94341",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA058E5-3CB8-4C30-AE22-3B6759A5F905",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "856830B6-6EAF-483C-91FD-940EC248E533",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD598982-D2BE-4313-85A7-A2169C08A288",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFF906F-6379-4BFF-8E23-A9AC9AE443DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94221075-DD47-45FD-8A2A-D364573FFDF5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "572B9A2B-F23D-4EFE-8ACC-3D8357158D02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F67023B-114D-46FC-A26B-23E2BAB8DD61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F54EB87-09B7-4E80-A646-5284B884B059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E157B59-9642-457B-BB3C-FBA629F43CBB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62FAEA47-94A3-4C5A-9A6E-4E47A42BA130",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1811B5C7-013C-4965-AB2E-B0A089605E42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A82FC5-5646-47B7-B6BB-84A374DFD864",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE02F8EE-421E-4487-8C91-AB2880C7056B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF86B7B-4028-41C7-938E-8F299568CB19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E33072D-4807-4803-83EA-90D0A721B835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "540041FD-F241-4EA4-BBBC-16B28449779A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFCD485-4013-48A4-8D88-F5D53BAC9065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
"matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
"matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure."
},
{
"lang": "es",
"value": "IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n."
}
],
"id": "CVE-2022-23824",
"lastModified": "2024-02-04T08:15:09.267",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-09T21:15:13.530",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
},
{
"source": "psirt@amd.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
},
{
"source": "psirt@amd.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
},
{
"source": "psirt@amd.com",
"url": "https://security.gentoo.org/glsa/202402-07"
},
{
"source": "psirt@amd.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
},
{
"source": "psirt@amd.com",
"url": "https://www.debian.org/security/2023/dsa-5378"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.