var-202001-0472
Vulnerability from variot
Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access. Intel(R) Processor Graphics There is an information leakage vulnerability in.Information may be obtained. This vulnerability stems from configuration errors in network systems or products during operation. (CVE-2019-20096)
Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel when used as an access point would send IAPP location updates for stations before client authentication had completed. (CVE-2020-7053)
Update instructions:
The problem can be corrected by updating your livepatches to the following versions:
| Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-168.197 | 63.1 | generic, lowlatency | | 4.4.0-168.197~14.04.1 | 63.1 | lowlatency, generic | | 4.4.0-169.198 | 63.1 | generic, lowlatency | | 4.4.0-169.198~14.04.1 | 63.1 | lowlatency, generic | | 4.4.0-170.199 | 63.1 | lowlatency, generic | | 4.4.0-170.199~14.04.1 | 63.1 | lowlatency, generic | | 4.4.0-171.200 | 63.1 | lowlatency, generic | | 4.4.0-171.200~14.04.1 | 63.1 | generic, lowlatency | | 4.4.0-173.203 | 63.1 | generic, lowlatency | | 4.4.0-1098.109 | 63.1 | aws | | 4.4.0-1099.110 | 63.1 | aws | | 4.4.0-1100.111 | 63.1 | aws | | 4.4.0-1101.112 | 63.1 | aws | | 4.15.0-69.78 | 63.1 | generic, lowlatency | | 4.15.0-69.78~16.04.1 | 63.1 | lowlatency, generic | | 4.15.0-70.79 | 63.1 | lowlatency, generic | | 4.15.0-70.79~16.04.1 | 63.1 | generic, lowlatency | | 4.15.0-72.81 | 63.1 | generic, lowlatency | | 4.15.0-72.81~16.04.1 | 63.1 | generic, lowlatency | | 4.15.0-74.83~16.04.1 | 63.1 | lowlatency, generic | | 4.15.0-74.84 | 63.1 | generic, lowlatency | | 4.15.0-76.86 | 63.1 | generic, lowlatency | | 4.15.0-76.86~16.04.1 | 63.1 | lowlatency, generic | | 4.15.0-1054.56 | 63.1 | aws | | 4.15.0-1056.58 | 63.1 | aws | | 4.15.0-1057.59 | 63.1 | aws | | 4.15.0-1058.60 | 63.1 | aws | | 4.15.0-1063.68 | 63.1 | azure | | 4.15.0-1063.72 | 63.1 | oem | | 4.15.0-1064.69 | 63.1 | azure | | 4.15.0-1064.73 | 63.1 | oem | | 4.15.0-1065.75 | 63.1 | oem | | 4.15.0-1066.71 | 63.1 | azure | | 4.15.0-1066.76 | 63.1 | oem | | 4.15.0-1067.72 | 63.1 | azure | | 4.15.0-1067.77 | 63.1 | oem | | 5.0.0-1025.26~18.04.1 | 63.1 | gcp | | 5.0.0-1025.27~18.04.1 | 63.1 | azure | | 5.0.0-1026.27~18.04.1 | 63.1 | gcp | | 5.0.0-1027.29~18.04.1 | 63.1 | azure | | 5.0.0-1028.29~18.04.1 | 63.1 | gcp | | 5.0.0-1028.30~18.04.1 | 63.1 | azure | | 5.0.0-1029.30~18.04.1 | 63.1 | gcp | | 5.0.0-1029.31~18.04.1 | 63.1 | azure |
Support Information:
Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible.
| Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1054 | aws | | Ubuntu 16.04 LTS | 4.4.0-1098 | aws | | Ubuntu 18.04 LTS | 5.0.0-1025 | azure | | Ubuntu 16.04 LTS | 4.15.0-1063 | azure | | Ubuntu 18.04 LTS | 4.15.0-69 | generic lowlatency | | Ubuntu 18.04 LTS | 5.0.0-1025 | gcp | | Ubuntu 16.04 LTS | 4.15.0-69 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-168 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1063 | oem | | Ubuntu 16.04 LTS | 4.4.0-168 | generic lowlatency |
References: CVE-2019-5108, CVE-2019-14615, CVE-2019-19050, CVE-2019-20096, CVE-2020-7053
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . ========================================================================== Ubuntu Security Notice USN-4284-1 February 18, 2020
linux, linux-aws, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-azure-5.3: Linux kernel for Microsoft Azure Cloud systems - linux-gcp-5.3: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel - linux-raspi2-5.3: Linux kernel for Raspberry Pi 2
Details:
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615)
It was discovered that the Atheros 802.11ac wireless USB device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-15099)
It was discovered that the HSA Linux kernel driver for AMD GPU devices did not properly check for errors in certain situations, leading to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service. (CVE-2019-16229)
It was discovered that the Marvell 8xxx Libertas WLAN device driver in the Linux kernel did not properly check for errors in certain situations, leading to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service. (CVE-2019-16232)
It was discovered that a race condition existed in the Virtual Video Test Driver in the Linux kernel. An attacker with write access to /dev/video0 on a system with the vivid module loaded could possibly use this to gain administrative privileges. (CVE-2019-18683)
It was discovered that the Renesas Digital Radio Interface (DRIF) driver in the Linux kernel did not properly initialize data. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-18786)
It was discovered that the Sound Open Firmware (SOF) driver in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-18811)
It was discovered that the crypto subsystem in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-19050, CVE-2019-19062)
It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex Driver for the Linux kernel. A local attacker could possibly use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)
It was discovered that the Realtek rtlwifi USB device driver in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could possibly use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-19063)
It was discovered that the RSI 91x WLAN device driver in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-19071)
It was discovered that the Broadcom Netxtreme HCA device driver in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could possibly use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-19077)
It was discovered that the Atheros 802.11ac wireless USB device driver in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could possibly use this to cause a denial of service (kernel memory exhaustion). (CVE-2019-19078)
It was discovered that the AMD GPU device drivers in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to possibly cause a denial of service (kernel memory exhaustion). (CVE-2019-19082)
It was discovered that the IO uring implementation in the Linux kernel did not properly perform credentials checks in certain situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2019-19241)
Or Cohen discovered that the virtual console subsystem in the Linux kernel did not properly restrict writes to unimplemented vcsu (unicode) devices. A local attacker could possibly use this to cause a denial of service (system crash) or have other unspecified impacts. (CVE-2019-19252)
It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle ioctl requests to get emulated CPUID features. An attacker with access to /dev/kvm could use this to cause a denial of service (system crash). (CVE-2019-19332)
It was discovered that a race condition existed in the Linux kernel on x86 platforms when keeping track of which process was assigned control of the FPU. A local attacker could use this to cause a denial of service (memory corruption) or possibly gain administrative privileges. (CVE-2019-19602)
It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle certain conditions. An attacker could use this to specially craft an ext4 file system that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19767)
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did not properly initialize memory in certain situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-19947)
Gao Chuan discovered that the SAS Class driver in the Linux kernel contained a race condition that could lead to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-19965)
It was discovered that the B2C2 FlexCop USB device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-15291)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: linux-image-5.3.0-1009-oracle 5.3.0-1009.10 linux-image-5.3.0-1010-kvm 5.3.0-1010.11 linux-image-5.3.0-1011-aws 5.3.0-1011.12 linux-image-5.3.0-1012-gcp 5.3.0-1012.13 linux-image-5.3.0-1018-raspi2 5.3.0-1018.20 linux-image-5.3.0-40-generic 5.3.0-40.32 linux-image-5.3.0-40-generic-lpae 5.3.0-40.32 linux-image-5.3.0-40-lowlatency 5.3.0-40.32 linux-image-5.3.0-40-snapdragon 5.3.0-40.32 linux-image-aws 5.3.0.1011.13 linux-image-gcp 5.3.0.1012.13 linux-image-generic 5.3.0.40.34 linux-image-generic-lpae 5.3.0.40.34 linux-image-gke 5.3.0.1012.13 linux-image-kvm 5.3.0.1010.12 linux-image-lowlatency 5.3.0.40.34 linux-image-oracle 5.3.0.1009.10 linux-image-raspi2 5.3.0.1018.15 linux-image-snapdragon 5.3.0.40.34 linux-image-virtual 5.3.0.40.34
Ubuntu 18.04 LTS: linux-image-5.3.0-1012-gcp 5.3.0-1012.13~18.04.1 linux-image-5.3.0-1013-azure 5.3.0-1013.14~18.04.1 linux-image-5.3.0-1018-raspi2 5.3.0-1018.20~18.04.1 linux-image-5.3.0-40-generic 5.3.0-40.32~18.04.1 linux-image-5.3.0-40-generic-lpae 5.3.0-40.32~18.04.1 linux-image-5.3.0-40-lowlatency 5.3.0-40.32~18.04.1 linux-image-azure-edge 5.3.0.1013.13 linux-image-gcp-edge 5.3.0.1012.11 linux-image-generic-hwe-18.04 5.3.0.40.97 linux-image-generic-lpae-hwe-18.04 5.3.0.40.97 linux-image-lowlatency-hwe-18.04 5.3.0.40.97 linux-image-raspi2-hwe-18.04 5.3.0.1018.7 linux-image-snapdragon-hwe-18.04 5.3.0.40.97 linux-image-virtual-hwe-18.04 5.3.0.40.97
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4284-1 CVE-2019-14615, CVE-2019-15099, CVE-2019-15291, CVE-2019-16229, CVE-2019-16232, CVE-2019-18683, CVE-2019-18786, CVE-2019-18811, CVE-2019-19050, CVE-2019-19057, CVE-2019-19062, CVE-2019-19063, CVE-2019-19071, CVE-2019-19077, CVE-2019-19078, CVE-2019-19082, CVE-2019-19241, CVE-2019-19252, CVE-2019-19332, CVE-2019-19602, CVE-2019-19767, CVE-2019-19947, CVE-2019-19965
Package Information: https://launchpad.net/ubuntu/+source/linux/5.3.0-40.32 https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1011.12 https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1012.13 https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1010.11 https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1009.10 https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1018.20 https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1013.14~18.04.1 https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1012.13~18.04.1 https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-40.32~18.04.1 https://launchpad.net/ubuntu/+source/linux-raspi2-5.3/5.3.0-1018.20~18.04.1
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: Openshift Logging 5.3.0 bug fix and security update Advisory ID: RHSA-2021:4627-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:4627 Issue date: 2021-11-15 CVE Names: CVE-2018-20673 CVE-2018-25009 CVE-2018-25010 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 CVE-2019-14615 CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 CVE-2020-0427 CVE-2020-10001 CVE-2020-12762 CVE-2020-13435 CVE-2020-14145 CVE-2020-14155 CVE-2020-16135 CVE-2020-17541 CVE-2020-24370 CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139 CVE-2020-26140 CVE-2020-26141 CVE-2020-26143 CVE-2020-26144 CVE-2020-26145 CVE-2020-26146 CVE-2020-26147 CVE-2020-27777 CVE-2020-29368 CVE-2020-29660 CVE-2020-35448 CVE-2020-35521 CVE-2020-35522 CVE-2020-35523 CVE-2020-35524 CVE-2020-36158 CVE-2020-36312 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332 CVE-2020-36386 CVE-2021-0129 CVE-2021-3200 CVE-2021-3348 CVE-2021-3426 CVE-2021-3445 CVE-2021-3481 CVE-2021-3487 CVE-2021-3489 CVE-2021-3564 CVE-2021-3572 CVE-2021-3573 CVE-2021-3580 CVE-2021-3600 CVE-2021-3635 CVE-2021-3659 CVE-2021-3679 CVE-2021-3732 CVE-2021-3778 CVE-2021-3796 CVE-2021-3800 CVE-2021-20194 CVE-2021-20197 CVE-2021-20231 CVE-2021-20232 CVE-2021-20239 CVE-2021-20266 CVE-2021-20284 CVE-2021-22876 CVE-2021-22898 CVE-2021-22925 CVE-2021-23133 CVE-2021-23840 CVE-2021-23841 CVE-2021-27645 CVE-2021-28153 CVE-2021-28950 CVE-2021-28971 CVE-2021-29155 CVE-2021-29646 CVE-2021-29650 CVE-2021-31440 CVE-2021-31535 CVE-2021-31829 CVE-2021-31916 CVE-2021-33033 CVE-2021-33194 CVE-2021-33200 CVE-2021-33560 CVE-2021-33574 CVE-2021-35942 CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087 CVE-2021-42574 =====================================================================
- Summary:
An update is now available for OpenShift Logging 5.3.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Openshift Logging Bug Fix Release (5.3.0)
Security Fix(es):
- golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:
https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html
- Bugs fixed (https://bugzilla.redhat.com/):
1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1168 - Disable hostname verification in syslog TLS settings
LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd
LOG-1375 - ssl_ca_cert should be optional
LOG-1378 - CLO should support sasl_plaintext(Password over http)
LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate
LOG-1494 - Syslog output is serializing json incorrectly
LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server
LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing
LOG-1735 - Regression introducing flush_at_shutdown
LOG-1774 - The collector logs should be excluded in fluent.conf
LOG-1776 - fluentd total_limit_size sets value beyond available space
LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance
LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled
LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL
LOG-1903 - Fix the Display of ClusterLogging type in OLM
LOG-1911 - CLF API changes to Opt-in to multiline error detection
LOG-1918 - Alert FluentdNodeDown
always firing
LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYZJxoNzjgjWX9erEAQji2Q//bv8hVZq0D8Dz0Do5vdoPzpjDhM6wJr7U 3CqAqcxniXvHVbBiPHPsY3p3M62FSO5lg4oZnVfokEtrZmLe9ULZWLlNxVilAUCT 0urKKWCAIXF+QJcW9/KCuIfaMh8Mmvh2baq52azauCHCJ3UK9ontiGWqyUz/aq9F TM4P/eehnUU1WXAz9x4ycHP7fHZBuADkI8WOUZ5M/QpcoEvo7rLFdyat5MpMkeJx j7gGieb2ITvblxEML3LRdPljQxe56w7p2jC/EoXJnssjABozlWB936Ub/QSulGuz +HQS+RnAGxRRpNcs1wNQzpIkCFJN2S0jlEj5VLB8xLbZTYtILWhIx4rlwaFy6NJn /z7hpEfSAgmhPTejshI/2Gfu/sc+KStEJk2IasWO1wqQWRqYGVeLwgHxBt2wpX+I XJUjhkAdhAWyDfEhPXzpbN4dhmDk0QiGfL3KWZ8nO54IFQgZHT1P1YArnI1hMWC7 JhTyj1DtFOKJl8X28wf6RNui+ifD12hmIAuQRuJTPjZbTnywwpMy+Sq9mrfeHztb gPt2AqOPF5ksNB6OsjVKlMScLlLJzzlkBVgmurXaly0z2qLjy0Rl70oWeMOW4xUD 4Ravk3PLEMqSIHv0ECr4ku5ejMV1Rd46USrgVX2R0CALXIxPkk1IEN8hHmzIGz2D HHJuAvrlroc= =di1X -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0472", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "atom e660", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e3827", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g3930", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e3826", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n3050", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2807", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3735d", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e620", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j1850", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g4950", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2910", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3740d", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e680", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3745", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3735g", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2520", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e3805", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2815", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x3-c3200rk", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g4930", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2820", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e640", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2480", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e660t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e680t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3785", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2810", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3560", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2460", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x3-c3130", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2580", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3580", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n3060", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2808", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3570", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e3815", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2760", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j1900", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3740", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x7-z8700", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3736f", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g3900", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j1800", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2920", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3460", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n4120", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n3150", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3530", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g4900t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2805", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2560", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3735e", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g4920", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x3-c3230rk", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n4020", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e640t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x5-z8330", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3745d", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e620t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x5-z8500", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3770", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g4900", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n3160", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3480", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x3-c3445", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3590", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3770d", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3775d", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e3825", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x5-z8300", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3775", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3795", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3736g", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom e3845", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j4125", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j1750", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n3010", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom x3-c3405", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g3930t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g3950", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j4025", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n3350e", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z2420", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron g4930t", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron j3355e", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "atom z3735f", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "celeron n2806", "scope": "eq", "trust": 2.0, "vendor": "intel", "version": null }, { "model": "core i3-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "core i3-7167u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i3-6100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "core i3-6006u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.10" }, { "model": "core i3-6100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8559u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "xeon e-2186g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7440eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6822eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "core i7-9850he", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i7-7567u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7130u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2224", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1585", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2288g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9350kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1235l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8500y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "xeon e-2176g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "core i5-7267u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2144g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6157u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7440hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8809g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6920hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2174g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10710u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3-7300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7020u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6770hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7y75", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i7-6700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8257u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9750hf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2226g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7101e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i7-6567u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i7-8705g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5-8500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1501l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9500e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8709g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "xeon e3-1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6167u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8365ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i7-7700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6685r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6442eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1268l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7y57", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2136", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2244g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8365u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "core i7-9700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8145ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2146g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "core i7-7560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "xeon e3-1545m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "xeon e3-1515m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2124g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6585r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i3-6100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9500f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3-6098p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2134", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i5-8210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8279u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i7-8700b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6402p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6350hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2246g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "core i5-6600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8565u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "core i7-6870hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8665u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2234", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "core i3-7100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1505m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "core i3-1005g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2126g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9100hl", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6440eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8145u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7300hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2124", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8259u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-9100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7101te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "core i7-8086k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5-9400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6970hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8109u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2224g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7920hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8665ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1065g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2286g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1565l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1535m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9300hf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6300hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8269u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6660u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1558l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "core i5-9500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8130u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6440hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i7-9850hl", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "xeon e3-1578l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1501m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2236", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8305g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1575m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2104g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6267u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7442eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1505l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8569u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1585l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "core i3-9320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7660u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6785r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8265u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8706g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2274g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "core i5-8200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7y54", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8557u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu", "scope": null, "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "atom e3805", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e3815", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e3825", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e3826", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e3827", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e3845", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e620", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e620t", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e640", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "atom e640t", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "NVD", "id": "CVE-2019-14615" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:canonical:ubuntu_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e3805", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e3815", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e3825", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e3826", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e3827", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e3845", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e620", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e620t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e640", "vulnerable": true }, { "cpe22Uri": "cpe:/h:intel:atom_e640t", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014592" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu,Apple,Benjamin M. Romer", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-533" } ], "trust": 0.6 }, "cve": "CVE-2019-14615", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2019-14615", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 1.9, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2019-014592", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-146579", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-14615", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2019-014592", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14615", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2019-014592", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202001-533", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-146579", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-146579" }, { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "CNNVD", "id": "CNNVD-202001-533" }, { "db": "NVD", "id": "CVE-2019-14615" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access. Intel(R) Processor Graphics There is an information leakage vulnerability in.Information may be obtained. This vulnerability stems from configuration errors in network systems or products during operation. (CVE-2019-20096)\n\nMitchell Frank discovered that the Wi-Fi implementation in the Linux kernel\nwhen used as an access point would send IAPP location updates for stations\nbefore client authentication had completed. (CVE-2020-7053)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel | Version | flavors |\n|--------------------------+----------+--------------------------|\n| 4.4.0-168.197 | 63.1 | generic, lowlatency |\n| 4.4.0-168.197~14.04.1 | 63.1 | lowlatency, generic |\n| 4.4.0-169.198 | 63.1 | generic, lowlatency |\n| 4.4.0-169.198~14.04.1 | 63.1 | lowlatency, generic |\n| 4.4.0-170.199 | 63.1 | lowlatency, generic |\n| 4.4.0-170.199~14.04.1 | 63.1 | lowlatency, generic |\n| 4.4.0-171.200 | 63.1 | lowlatency, generic |\n| 4.4.0-171.200~14.04.1 | 63.1 | generic, lowlatency |\n| 4.4.0-173.203 | 63.1 | generic, lowlatency |\n| 4.4.0-1098.109 | 63.1 | aws |\n| 4.4.0-1099.110 | 63.1 | aws |\n| 4.4.0-1100.111 | 63.1 | aws |\n| 4.4.0-1101.112 | 63.1 | aws |\n| 4.15.0-69.78 | 63.1 | generic, lowlatency |\n| 4.15.0-69.78~16.04.1 | 63.1 | lowlatency, generic |\n| 4.15.0-70.79 | 63.1 | lowlatency, generic |\n| 4.15.0-70.79~16.04.1 | 63.1 | generic, lowlatency |\n| 4.15.0-72.81 | 63.1 | generic, lowlatency |\n| 4.15.0-72.81~16.04.1 | 63.1 | generic, lowlatency |\n| 4.15.0-74.83~16.04.1 | 63.1 | lowlatency, generic |\n| 4.15.0-74.84 | 63.1 | generic, lowlatency |\n| 4.15.0-76.86 | 63.1 | generic, lowlatency |\n| 4.15.0-76.86~16.04.1 | 63.1 | lowlatency, generic |\n| 4.15.0-1054.56 | 63.1 | aws |\n| 4.15.0-1056.58 | 63.1 | aws |\n| 4.15.0-1057.59 | 63.1 | aws |\n| 4.15.0-1058.60 | 63.1 | aws |\n| 4.15.0-1063.68 | 63.1 | azure |\n| 4.15.0-1063.72 | 63.1 | oem |\n| 4.15.0-1064.69 | 63.1 | azure |\n| 4.15.0-1064.73 | 63.1 | oem |\n| 4.15.0-1065.75 | 63.1 | oem |\n| 4.15.0-1066.71 | 63.1 | azure |\n| 4.15.0-1066.76 | 63.1 | oem |\n| 4.15.0-1067.72 | 63.1 | azure |\n| 4.15.0-1067.77 | 63.1 | oem |\n| 5.0.0-1025.26~18.04.1 | 63.1 | gcp |\n| 5.0.0-1025.27~18.04.1 | 63.1 | azure |\n| 5.0.0-1026.27~18.04.1 | 63.1 | gcp |\n| 5.0.0-1027.29~18.04.1 | 63.1 | azure |\n| 5.0.0-1028.29~18.04.1 | 63.1 | gcp |\n| 5.0.0-1028.30~18.04.1 | 63.1 | azure |\n| 5.0.0-1029.30~18.04.1 | 63.1 | gcp |\n| 5.0.0-1029.31~18.04.1 | 63.1 | azure |\n\nSupport Information:\n\nKernels older than the levels listed below do not receive livepatch\nupdates. Please upgrade your kernel as soon as possible. \n\n| Series | Version | Flavors |\n|------------------+------------------+--------------------------|\n| Ubuntu 18.04 LTS | 4.15.0-1054 | aws |\n| Ubuntu 16.04 LTS | 4.4.0-1098 | aws |\n| Ubuntu 18.04 LTS | 5.0.0-1025 | azure |\n| Ubuntu 16.04 LTS | 4.15.0-1063 | azure |\n| Ubuntu 18.04 LTS | 4.15.0-69 | generic lowlatency |\n| Ubuntu 18.04 LTS | 5.0.0-1025 | gcp |\n| Ubuntu 16.04 LTS | 4.15.0-69 | generic lowlatency |\n| Ubuntu 14.04 LTS | 4.4.0-168 | generic lowlatency |\n| Ubuntu 18.04 LTS | 4.15.0-1063 | oem |\n| Ubuntu 16.04 LTS | 4.4.0-168 | generic lowlatency |\n\nReferences:\n CVE-2019-5108, CVE-2019-14615, CVE-2019-19050, CVE-2019-20096, \n CVE-2020-7053\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. ==========================================================================\nUbuntu Security Notice USN-4284-1\nFebruary 18, 2020\n\nlinux, linux-aws, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-hwe,\nlinux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3 vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.10\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-kvm: Linux kernel for cloud environments\n- linux-oracle: Linux kernel for Oracle Cloud systems\n- linux-raspi2: Linux kernel for Raspberry Pi 2\n- linux-azure-5.3: Linux kernel for Microsoft Azure Cloud systems\n- linux-gcp-5.3: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-hwe: Linux hardware enablement (HWE) kernel\n- linux-raspi2-5.3: Linux kernel for Raspberry Pi 2\n\nDetails:\n\nIt was discovered that the Linux kernel did not properly clear data\nstructures on context switches for certain Intel graphics processors. A\nlocal attacker could use this to expose sensitive information. \n(CVE-2019-14615)\n\nIt was discovered that the Atheros 802.11ac wireless USB device driver in\nthe Linux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2019-15099)\n\nIt was discovered that the HSA Linux kernel driver for AMD GPU devices did\nnot properly check for errors in certain situations, leading to a NULL\npointer dereference. A local attacker could possibly use this to cause a\ndenial of service. (CVE-2019-16229)\n\nIt was discovered that the Marvell 8xxx Libertas WLAN device driver in the\nLinux kernel did not properly check for errors in certain situations,\nleading to a NULL pointer dereference. A local attacker could possibly use\nthis to cause a denial of service. (CVE-2019-16232)\n\nIt was discovered that a race condition existed in the Virtual Video Test\nDriver in the Linux kernel. An attacker with write access to /dev/video0 on\na system with the vivid module loaded could possibly use this to gain\nadministrative privileges. (CVE-2019-18683)\n\nIt was discovered that the Renesas Digital Radio Interface (DRIF) driver in\nthe Linux kernel did not properly initialize data. A local attacker could\npossibly use this to expose sensitive information (kernel memory). \n(CVE-2019-18786)\n\nIt was discovered that the Sound Open Firmware (SOF) driver in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-18811)\n\nIt was discovered that the crypto subsystem in the Linux kernel did not\nproperly deallocate memory in certain error conditions. A local attacker\ncould use this to cause a denial of service (kernel memory exhaustion). \n(CVE-2019-19050, CVE-2019-19062)\n\nIt was discovered that multiple memory leaks existed in the Marvell WiFi-Ex\nDriver for the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (kernel memory exhaustion). (CVE-2019-19057)\n\nIt was discovered that the Realtek rtlwifi USB device driver in the Linux\nkernel did not properly deallocate memory in certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19063)\n\nIt was discovered that the RSI 91x WLAN device driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A local\nattacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2019-19071)\n\nIt was discovered that the Broadcom Netxtreme HCA device driver in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19077)\n\nIt was discovered that the Atheros 802.11ac wireless USB device driver in\nthe Linux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could possibly use this to cause a denial of\nservice (kernel memory exhaustion). (CVE-2019-19078)\n\nIt was discovered that the AMD GPU device drivers in the Linux kernel did\nnot properly deallocate memory in certain error conditions. A local\nattacker could use this to possibly cause a denial of service (kernel\nmemory exhaustion). (CVE-2019-19082)\n\nIt was discovered that the IO uring implementation in the Linux kernel did\nnot properly perform credentials checks in certain situations. A local\nattacker could possibly use this to gain administrative privileges. \n(CVE-2019-19241)\n\nOr Cohen discovered that the virtual console subsystem in the Linux kernel\ndid not properly restrict writes to unimplemented vcsu (unicode) devices. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash) or have other unspecified impacts. (CVE-2019-19252)\n\nIt was discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly handle ioctl requests to get emulated CPUID\nfeatures. An attacker with access to /dev/kvm could use this to cause a\ndenial of service (system crash). (CVE-2019-19332)\n\nIt was discovered that a race condition existed in the Linux kernel on x86\nplatforms when keeping track of which process was assigned control of the\nFPU. A local attacker could use this to cause a denial of service (memory\ncorruption) or possibly gain administrative privileges. (CVE-2019-19602)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly handle certain conditions. An attacker could use\nthis to specially craft an ext4 file system that, when mounted, could cause\na denial of service (system crash) or possibly execute arbitrary code. \n(CVE-2019-19767)\n\nIt was discovered that the Kvaser CAN/USB driver in the Linux kernel did\nnot properly initialize memory in certain situations. A local attacker\ncould possibly use this to expose sensitive information (kernel memory). \n(CVE-2019-19947)\n\nGao Chuan discovered that the SAS Class driver in the Linux kernel\ncontained a race condition that could lead to a NULL pointer dereference. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-19965)\n\nIt was discovered that the B2C2 FlexCop USB device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash). \n(CVE-2019-15291)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.10:\n linux-image-5.3.0-1009-oracle 5.3.0-1009.10\n linux-image-5.3.0-1010-kvm 5.3.0-1010.11\n linux-image-5.3.0-1011-aws 5.3.0-1011.12\n linux-image-5.3.0-1012-gcp 5.3.0-1012.13\n linux-image-5.3.0-1018-raspi2 5.3.0-1018.20\n linux-image-5.3.0-40-generic 5.3.0-40.32\n linux-image-5.3.0-40-generic-lpae 5.3.0-40.32\n linux-image-5.3.0-40-lowlatency 5.3.0-40.32\n linux-image-5.3.0-40-snapdragon 5.3.0-40.32\n linux-image-aws 5.3.0.1011.13\n linux-image-gcp 5.3.0.1012.13\n linux-image-generic 5.3.0.40.34\n linux-image-generic-lpae 5.3.0.40.34\n linux-image-gke 5.3.0.1012.13\n linux-image-kvm 5.3.0.1010.12\n linux-image-lowlatency 5.3.0.40.34\n linux-image-oracle 5.3.0.1009.10\n linux-image-raspi2 5.3.0.1018.15\n linux-image-snapdragon 5.3.0.40.34\n linux-image-virtual 5.3.0.40.34\n\nUbuntu 18.04 LTS:\n linux-image-5.3.0-1012-gcp 5.3.0-1012.13~18.04.1\n linux-image-5.3.0-1013-azure 5.3.0-1013.14~18.04.1\n linux-image-5.3.0-1018-raspi2 5.3.0-1018.20~18.04.1\n linux-image-5.3.0-40-generic 5.3.0-40.32~18.04.1\n linux-image-5.3.0-40-generic-lpae 5.3.0-40.32~18.04.1\n linux-image-5.3.0-40-lowlatency 5.3.0-40.32~18.04.1\n linux-image-azure-edge 5.3.0.1013.13\n linux-image-gcp-edge 5.3.0.1012.11\n linux-image-generic-hwe-18.04 5.3.0.40.97\n linux-image-generic-lpae-hwe-18.04 5.3.0.40.97\n linux-image-lowlatency-hwe-18.04 5.3.0.40.97\n linux-image-raspi2-hwe-18.04 5.3.0.1018.7\n linux-image-snapdragon-hwe-18.04 5.3.0.40.97\n linux-image-virtual-hwe-18.04 5.3.0.40.97\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4284-1\n CVE-2019-14615, CVE-2019-15099, CVE-2019-15291, CVE-2019-16229,\n CVE-2019-16232, CVE-2019-18683, CVE-2019-18786, CVE-2019-18811,\n CVE-2019-19050, CVE-2019-19057, CVE-2019-19062, CVE-2019-19063,\n CVE-2019-19071, CVE-2019-19077, CVE-2019-19078, CVE-2019-19082,\n CVE-2019-19241, CVE-2019-19252, CVE-2019-19332, CVE-2019-19602,\n CVE-2019-19767, CVE-2019-19947, CVE-2019-19965\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/5.3.0-40.32\n https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1011.12\n https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1012.13\n https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1010.11\n https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1009.10\n https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1018.20\n https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1013.14~18.04.1\n https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1012.13~18.04.1\n https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-40.32~18.04.1\n https://launchpad.net/ubuntu/+source/linux-raspi2-5.3/5.3.0-1018.20~18.04.1\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: Openshift Logging 5.3.0 bug fix and security update\nAdvisory ID: RHSA-2021:4627-01\nProduct: Red Hat OpenShift Enterprise\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:4627\nIssue date: 2021-11-15\nCVE Names: CVE-2018-20673 CVE-2018-25009 CVE-2018-25010 \n CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 \n CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 \n CVE-2019-14615 CVE-2019-17594 CVE-2019-17595 \n CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 \n CVE-2020-0427 CVE-2020-10001 CVE-2020-12762 \n CVE-2020-13435 CVE-2020-14145 CVE-2020-14155 \n CVE-2020-16135 CVE-2020-17541 CVE-2020-24370 \n CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 \n CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 \n CVE-2020-26139 CVE-2020-26140 CVE-2020-26141 \n CVE-2020-26143 CVE-2020-26144 CVE-2020-26145 \n CVE-2020-26146 CVE-2020-26147 CVE-2020-27777 \n CVE-2020-29368 CVE-2020-29660 CVE-2020-35448 \n CVE-2020-35521 CVE-2020-35522 CVE-2020-35523 \n CVE-2020-35524 CVE-2020-36158 CVE-2020-36312 \n CVE-2020-36330 CVE-2020-36331 CVE-2020-36332 \n CVE-2020-36386 CVE-2021-0129 CVE-2021-3200 \n CVE-2021-3348 CVE-2021-3426 CVE-2021-3445 \n CVE-2021-3481 CVE-2021-3487 CVE-2021-3489 \n CVE-2021-3564 CVE-2021-3572 CVE-2021-3573 \n CVE-2021-3580 CVE-2021-3600 CVE-2021-3635 \n CVE-2021-3659 CVE-2021-3679 CVE-2021-3732 \n CVE-2021-3778 CVE-2021-3796 CVE-2021-3800 \n CVE-2021-20194 CVE-2021-20197 CVE-2021-20231 \n CVE-2021-20232 CVE-2021-20239 CVE-2021-20266 \n CVE-2021-20284 CVE-2021-22876 CVE-2021-22898 \n CVE-2021-22925 CVE-2021-23133 CVE-2021-23840 \n CVE-2021-23841 CVE-2021-27645 CVE-2021-28153 \n CVE-2021-28950 CVE-2021-28971 CVE-2021-29155 \n CVE-2021-29646 CVE-2021-29650 CVE-2021-31440 \n CVE-2021-31535 CVE-2021-31829 CVE-2021-31916 \n CVE-2021-33033 CVE-2021-33194 CVE-2021-33200 \n CVE-2021-33560 CVE-2021-33574 CVE-2021-35942 \n CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 \n CVE-2021-36087 CVE-2021-42574 \n=====================================================================\n\n1. Summary:\n\nAn update is now available for OpenShift Logging 5.3. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Description:\n\nOpenshift Logging Bug Fix Release (5.3.0)\n\nSecurity Fix(es):\n\n* golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n3. Solution:\n\nFor OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply\nthis update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1168 - Disable hostname verification in syslog TLS settings\nLOG-1235 - Using HTTPS without a secret does not translate into the correct \u0027scheme\u0027 value in Fluentd\nLOG-1375 - ssl_ca_cert should be optional\nLOG-1378 - CLO should support sasl_plaintext(Password over http)\nLOG-1392 - In fluentd config, flush_interval can\u0027t be set with flush_mode=immediate\nLOG-1494 - Syslog output is serializing json incorrectly\nLOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server\nLOG-1575 - Rejected by Elasticsearch and unexpected json-parsing\nLOG-1735 - Regression introducing flush_at_shutdown \nLOG-1774 - The collector logs should be excluded in fluent.conf\nLOG-1776 - fluentd total_limit_size sets value beyond available space\nLOG-1822 - OpenShift Alerting Rules Style-Guide Compliance\nLOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled\nLOG-1862 - Unsupported kafka parameters when enabled Kafka SASL\nLOG-1903 - Fix the Display of ClusterLogging type in OLM\nLOG-1911 - CLF API changes to Opt-in to multiline error detection\nLOG-1918 - Alert `FluentdNodeDown` always firing \nLOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nHHJuAvrlroc=\n=di1X\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2019-14615" }, { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "VULHUB", "id": "VHN-146579" }, { "db": "PACKETSTORM", "id": "156429" }, { "db": "PACKETSTORM", "id": "156419" }, { "db": "PACKETSTORM", "id": "156123" }, { "db": "PACKETSTORM", "id": "156455" }, { "db": "PACKETSTORM", "id": "156418" }, { "db": "PACKETSTORM", "id": "156420" }, { "db": "PACKETSTORM", "id": "164967" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14615", "trust": 3.2 }, { "db": "PACKETSTORM", "id": "156455", "trust": 1.8 }, { "db": "PACKETSTORM", "id": "156185", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "156429", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "164967", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU98694410", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-014592", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "165296", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156894", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202001-533", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0305", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1745.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0796", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0719", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0572", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0949", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0830", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0851", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3905", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1042", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0572.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0843", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1812", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1745", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0797", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4254", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0772", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-30350", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "156123", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "156420", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "156419", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "156418", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "156122", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156124", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156427", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156107", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156110", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156109", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156422", "trust": 0.1 }, { "db": "CNVD", "id": "CNVD-2020-14840", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-146579", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-146579" }, { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "PACKETSTORM", "id": "156429" }, { "db": "PACKETSTORM", "id": "156419" }, { "db": "PACKETSTORM", "id": "156123" }, { "db": "PACKETSTORM", "id": "156455" }, { "db": "PACKETSTORM", "id": "156418" }, { "db": "PACKETSTORM", "id": "156420" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "CNNVD", "id": "CNNVD-202001-533" }, { "db": "NVD", "id": "CVE-2019-14615" } ] }, "id": "VAR-202001-0472", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-146579" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:20:35.023000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00314", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html" }, { "title": "USN-4254-2", "trust": 0.8, "url": "https://usn.ubuntu.com/4254-2/" }, { "title": "USN-4255-1", "trust": 0.8, "url": "https://usn.ubuntu.com/4255-1/" }, { "title": "USN-4255-2", "trust": 0.8, "url": "https://usn.ubuntu.com/4255-2/" }, { "title": "USN-4285-1", "trust": 0.8, "url": "https://usn.ubuntu.com/4285-1/" }, { "title": "USN-4286-2", "trust": 0.8, "url": "https://usn.ubuntu.com/4286-2/" }, { "title": "USN-4287-1", "trust": 0.8, "url": "https://usn.ubuntu.com/4287-1/" }, { "title": "USN-4253-1", "trust": 0.8, "url": "https://usn.ubuntu.com/4253-1/" }, { "title": "USN-4253-2", "trust": 0.8, "url": "https://usn.ubuntu.com/4253-2/" }, { "title": "USN-4254-1", "trust": 0.8, "url": "https://usn.ubuntu.com/4254-1/" }, { "title": "Intel Processor Graphics Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110063" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "CNNVD", "id": "CNNVD-202001-533" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-146579" }, { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "NVD", "id": "CVE-2019-14615" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://support.apple.com/kb/ht211100" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/156185/kernel-live-patch-security-notice-lsn-0062-1.html" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/156455/kernel-live-patch-security-notice-lsn-0063-1.html" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4253-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4253-2/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4254-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4254-2/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4255-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4255-2/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4284-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4285-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4286-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4286-2/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4287-1/" }, { "trust": 2.3, "url": "https://usn.ubuntu.com/4287-2/" }, { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14615" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/mar/31" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14615" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98694410/" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/4258-1/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0843/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0796/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0851/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0772/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0572/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156894/apple-security-advisory-2020-03-24-2.html" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht211100" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0719/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0949/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0305/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156429/ubuntu-security-notice-usn-4286-2.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0572.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1745.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0830/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/165296/red-hat-security-advisory-2021-5137-03.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0797/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/linux-kernel-information-disclosure-via-intel-gpu-eu-state-during-context-switch-31335" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4254" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1042/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1745/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1812/" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-30350" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164967/red-hat-security-advisory-2021-4627-01.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19965" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5108" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20096" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7053" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15217" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19066" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15220" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17351" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19056" }, { "trust": 0.2, "url": "https://usn.ubuntu.com/4286-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19068" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19051" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15221" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19063" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19947" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16229" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18786" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19057" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16232" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19050" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4286-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.0/5.0.0-1025.28" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1031.32" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1032.34" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.0/5.0.0-1011.16" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4285-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18809" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1030.31" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-76.86~16.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4255-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1058.60~16.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4255-2" }, { "trust": 0.1, "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19241" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18811" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15099" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1009.10" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1013.14~18.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19078" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4284-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.3.0-40.32" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19071" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1012.13" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1012.13~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-40.32~18.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19077" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19767" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2-5.3/5.3.0-1018.20~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1018.20" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19082" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1011.12" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19602" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1010.11" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19252" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19332" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1129.138" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1102.113" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-174.204" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1133.141" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1066.73" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14155" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23133" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24370" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3573" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35521" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-25014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35522" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12762" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20838" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26141" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-27777" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26147" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3426" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14615" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17594" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-17541" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36386" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5827" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3800" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33574" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-42574" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19603" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36332" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24370" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29650" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3572" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14145" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25009" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24587" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26144" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-25012" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36331" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3200" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29155" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33033" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25010" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20197" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3487" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22876" }, { "trust": 0.1, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-0427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16135" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36312" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31829" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13750" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17595" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10001" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31440" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-25009" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26145" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3564" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10001" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-36085" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35448" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-19603" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20673" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3489" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-13750" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-17541" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-20673" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20231" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24503" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28971" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-25013" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26146" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3580" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14155" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26139" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3679" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35524" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-16135" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13751" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24588" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36158" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24504" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20266" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27645" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25013" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22925" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22898" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-36087" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-13751" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36330" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3348" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20838" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3778" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24503" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20284" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29646" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31535" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0427" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-35942" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12762" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25014" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3481" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24502" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-0129" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-13435" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-36086" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3635" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26143" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-29368" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14145" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35523" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20194" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3659" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28153" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33200" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20232" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33560" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-29660" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26140" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3796" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3600" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-25010" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24586" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-18218" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20239" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24502" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5827" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3732" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-36084" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28950" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18218" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4627" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31916" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25012" } ], "sources": [ { "db": "VULHUB", "id": "VHN-146579" }, { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "PACKETSTORM", "id": "156429" }, { "db": "PACKETSTORM", "id": "156419" }, { "db": "PACKETSTORM", "id": "156123" }, { "db": "PACKETSTORM", "id": "156455" }, { "db": "PACKETSTORM", "id": "156418" }, { "db": "PACKETSTORM", "id": "156420" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "CNNVD", "id": "CNNVD-202001-533" }, { "db": "NVD", "id": "CVE-2019-14615" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-146579" }, { "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "db": "PACKETSTORM", "id": "156429" }, { "db": "PACKETSTORM", "id": "156419" }, { "db": "PACKETSTORM", "id": "156123" }, { "db": "PACKETSTORM", "id": "156455" }, { "db": "PACKETSTORM", "id": "156418" }, { "db": "PACKETSTORM", "id": "156420" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "CNNVD", "id": "CNNVD-202001-533" }, { "db": "NVD", "id": "CVE-2019-14615" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-17T00:00:00", "db": "VULHUB", "id": "VHN-146579" }, { "date": "2020-03-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "date": "2020-02-19T15:37:55", "db": "PACKETSTORM", "id": "156429" }, { "date": "2020-02-19T15:25:47", "db": "PACKETSTORM", "id": "156419" }, { "date": "2020-01-29T17:14:57", "db": "PACKETSTORM", "id": "156123" }, { "date": "2020-02-20T21:14:24", "db": "PACKETSTORM", "id": "156455" }, { "date": "2020-02-19T15:25:33", "db": "PACKETSTORM", "id": "156418" }, { "date": "2020-02-19T15:26:05", "db": "PACKETSTORM", "id": "156420" }, { "date": "2021-11-15T17:25:56", "db": "PACKETSTORM", "id": "164967" }, { "date": "2020-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-533" }, { "date": "2020-01-17T18:15:12.963000", "db": "NVD", "id": "CVE-2019-14615" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-20T00:00:00", "db": "VULHUB", "id": "VHN-146579" }, { "date": "2020-03-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014592" }, { "date": "2021-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-533" }, { "date": "2024-11-21T04:27:02.810000", "db": "NVD", "id": "CVE-2019-14615" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "156429" }, { "db": "PACKETSTORM", "id": "156419" }, { "db": "PACKETSTORM", "id": "156123" }, { "db": "PACKETSTORM", "id": "156455" }, { "db": "PACKETSTORM", "id": "156418" }, { "db": "PACKETSTORM", "id": "156420" }, { "db": "CNNVD", "id": "CNNVD-202001-533" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel(R) Processor Graphics Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-533" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.