var-202006-0241
Vulnerability from variot
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654).
The microcode update for HEDT and Xeon CPUs with signature 0x50654 which was reverted in DSA 4565-2 is now included again with a fixed release.
The upstream update for Skylake-U/Y (signature 0x406e3) had to be excluded from this update due to reported hangs on boot.
For the stable distribution (buster), these problems have been fixed in version 3.20200609.2~deb10u1.
We recommend that you upgrade your intel-microcode packages.
For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7iSvVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH6g/9FYOaN5XyFFC8jVEmfdIl0pa8SqEH2+V1s27pAEOMhGAXuLrUms9wDq0J IoM54q/dz3rH3GiSi5nNqQDxLGx40DNSM5CCdCZIC22YvALS3aYsqpSSlDiyQZSb Im7isH8ntWIc3bedPWzfhui4VA19p8gnbFUetts3fp+uPeimd/QfPnJDN8wHUAL1 V2JzHMYD8v9axenbOxuWSArSnbubEtwpmHfhMzIMkE5150qhyofpzPBsKGoASa7q kPrwbUKBC11dGi+sV49rpXTf/ml7KDUDIrsA75sLC9WhckBcMdAkkVPLJyytAZ6A SqaOVJv+j0wVmhTtIqPxjvYCvX0y8i6NyQi+aliqzq7uEiQtaPQV8sWgDhyhTWga kxxiNuLfcuiEKkKToHdrkLLI1JiisqQTcwyRHg6k3X8+sNmKe6vFu3KzVbLo8+MH c3zEDQHP7XHm/euneb5ZFdg7+Rli03KWFm8/LNJQhrDcsFU/Si5268OwnzpGydwc eaIwuHtc8R64q+m5Aujo7X7kKk67zN7XhmX0nbr9Egni7dhG3iVrMtF27BTPMcML Gzz1pjktlYiySJYON64N/ooZchwAoAEhM9F1yPREXNf6PfRQG3lNjX3UeC4Ci0Ay /NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE= =cQzh -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:3028-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3028 Issue date: 2021-08-09 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 ==================================================================== 1. Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
-
hw: Vector Register Data Sampling (CVE-2020-0548)
-
hw: L1D Cache Eviction Sampling (CVE-2020-0549)
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
-
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
-
hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
-
hw: Vector Register Leakage-Active (CVE-2020-8696)
-
hw: Fast forward store predictor (CVE-2020-8698)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor 1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT 5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl l9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv sFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj ljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL Y7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ OepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ W3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn ltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2 f+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/ yvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA UjXnNBNse8A=LIYI -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2020-0548)
It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. ========================================================================= Ubuntu Security Notice USN-4393-1 June 10, 2020
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel
Details:
It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. (CVE-2020-12654)
It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: linux-image-3.2.0-147-generic 3.2.0-147.194 linux-image-3.2.0-147-generic-pae 3.2.0-147.194 linux-image-3.2.0-147-highbank 3.2.0-147.194 linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194 linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194 linux-image-3.2.0-147-virtual 3.2.0-147.194 linux-image-generic 3.2.0.147.161 linux-image-generic-pae 3.2.0.147.161 linux-image-highbank 3.2.0.147.161 linux-image-powerpc 3.2.0.147.161 linux-image-powerpc-smp 3.2.0.147.161 linux-image-powerpc64-smp 3.2.0.147.161 linux-image-server 3.2.0.147.161 linux-image-virtual 3.2.0.147.161
Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status.
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0241", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i3-3217ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7007u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4010y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4010u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 4405y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3560y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3765u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5675c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.10" }, { "model": "core i7-8705g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium a1018 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3900te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3120m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1037u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3450t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3220t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc627e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "core i7-8569u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1000m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2124", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3229y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5-6y54", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4430s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4030u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7920hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2146g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc427d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "xeon e3-1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2184g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7567u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2286m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8709g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 4205u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4130", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477e pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.14" }, { "model": "core i7-7700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7320t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y10c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3840qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3865u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.08" }, { "model": "celeron 2957u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1020m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3689y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4402ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3517ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3520m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7442eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2174g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3965y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4160t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7y75", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-7y30", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6567u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3439y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6870hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1620t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4030y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4258u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4702mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3220t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1585l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4100m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4590t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3555le", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3930te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "threat intelligence exchange server", "scope": "lte", "trust": 1.0, "vendor": "mcafee", "version": "2.3.1" }, { "model": "pentium g5400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4750hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3360m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8130u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc627d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i7-3612qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m6", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "26.01.07" }, { "model": "xeon e3-1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4288u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4810mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4370", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 927ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y70", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1545m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4005u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5015u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7440eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-8950hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 2981u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4020y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3350p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5575r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 5305u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y10", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3610me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3610qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2244g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5010u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1515m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.1" }, { "model": "celeron 1020e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2124g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5005u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3635qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5750hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4360", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7101te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4790t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4712mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4785t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2234", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8020", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3317u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4540", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "core m7-6y75", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4520", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4360t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3217u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 725c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6440eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4012y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5950hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4860hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8259u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.14" }, { "model": "xeon e3-1505m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3320m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7167u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3340m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y10a", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1019y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3765u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4710hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3210m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold 6405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3210", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3667u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8670t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3825u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2140 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6267u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "threat intelligence exchange server", "scope": "gte", "trust": 1.0, "vendor": "mcafee", "version": "2.0.0" }, { "model": "celeron g1610", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5775c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4760hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-6y30", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4400te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1558l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3902e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3250t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4278u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3240t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3340s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.08" }, { "model": "core i5-4690s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3205u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8265u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1820t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7y57", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3940xm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc677d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "celeron 2980u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3920t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4158u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "20.04" }, { "model": "core i9-9900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3460", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2284g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3556u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7020u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3227u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2120t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4210h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1578l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4590", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3920xm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3558u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4220y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4300y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4900mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5850hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4370t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9880h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3250", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6120t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2226ge", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5-6y57", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8809g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2030 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y51", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4690t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6822eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2100t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2129y v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2030m v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc527g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.4.0" }, { "model": "core 9750hf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3450s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-8100y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 4410y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 1405 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3560m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6320t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2126g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8557u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4330t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc847d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "pentium g5420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2010 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "pentium g2130 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3230m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7300hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1235 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3250", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1017u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.14" }, { "model": "core i3-4110m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4308u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8550", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4130t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1047ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3615qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5157u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7267u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3632qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3470s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6660u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4120u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4202y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2020m v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 2955u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3260t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2288g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-i3-8100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.2" }, { "model": "celeron g3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3612qe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2127u v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3820qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2186m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3537u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4170", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4440s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4150t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 4415y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3380m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1575m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5257u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2134", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4590s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6770hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6350hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5557u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4765t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276ml", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3755u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4710mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-2115c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4025u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2020 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2176m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.28.0" }, { "model": "celeron g1840", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4150", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8145u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4722hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4790s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7740x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "31" }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m4", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "celeron g1840t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1610t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7440hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3610qe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3615qe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4460", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4980hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3955u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4558u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278gel", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2224g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc647e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "core 8269u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3805u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3550s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2254me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "xeon e3-1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3115c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7660u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1535m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "core i5-3475s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3330s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 9300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8565u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium b925c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2236", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7120t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 4405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1265l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3470t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4170t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4702ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium b915c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6920hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8670", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4578u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3460t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2144g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2136", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7101e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4870hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3240t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2224", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3120me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3540m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4520t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc647d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core m-5y3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 2970m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8706g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1007u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4790", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8559u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4690", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2274g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3550", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3258", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "threat intelligence exchange server", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "3.0.0" }, { "model": "core i5-3437u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4702hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3517u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4712hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4460t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc827d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i3-6167u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc847e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "celeron g1820", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1585 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8305g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2120 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2246g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc3000 smart", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.b" }, { "model": "core i5-6442eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4800mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7640x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278ge", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8650k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6440hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6300hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3440t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "core i3-3130m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3110m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc347e", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2020t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3720qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3687u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simotion p320-4e", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "pentium g3470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3561y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5850eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4910mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3630qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3427u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1565l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6970hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8365u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4960hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7130u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1830", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4350t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3665u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2176g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3965u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y71", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4720hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1005m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3337u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8109u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 4415u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2117u v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7y54", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4610y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5006u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simotion p320-4s", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core 5405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3339y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5700eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2186g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8665u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2254ml", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc677e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "core i5-4302y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3740qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4460s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3250t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2226g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i3-8000t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5775r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3930e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4950hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1535m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3215u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc547e", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "celeron 3855u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4850hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1221 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8500y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2030t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5675r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4771", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5020u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2020-0543" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" } ], "trust": 0.4 }, "cve": "CVE-2020-0543", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-0543", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-161977", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-0543", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-0543", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-161977", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-0543", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654). \n\nThe microcode update for HEDT and Xeon CPUs with signature 0x50654 which\nwas reverted in DSA 4565-2 is now included again with a fixed release. \n\nThe upstream update for Skylake-U/Y (signature 0x406e3) had to be\nexcluded from this update due to reported hangs on boot. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.20200609.2~deb10u1. \n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n/NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE=\n=cQzh\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2021:3028-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:3028\nIssue date: 2021-08-09\nCVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549\n CVE-2020-8695 CVE-2020-8696 CVE-2020-8698\n CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1788786 - CVE-2020-0548 hw: Vector Register Data Sampling\n1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling\n1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0543\nhttps://access.redhat.com/security/cve/CVE-2020-0548\nhttps://access.redhat.com/security/cve/CVE-2020-0549\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nUjXnNBNse8A=LIYI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. (CVE-2020-0548)\n\nIt was discovered that on some Intel processors, data from the most\nrecently evicted modified L1 data cache (L1D) line may be propagated into\nan unused (invalid) L1D fill buffer. =========================================================================\nUbuntu Security Notice USN-4393-1\nJune 10, 2020\n\nlinux vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n\nDetails:\n\nIt was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did\nnot properly validate status lengths in messages received from an access\npoint, leading to a buffer overflow. A physically proximate attacker\ncontrolling an access point could use this to construct messages that could\npossibly result in arbitrary code execution. (CVE-2020-12654)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n linux-image-3.2.0-147-generic 3.2.0-147.194\n linux-image-3.2.0-147-generic-pae 3.2.0-147.194\n linux-image-3.2.0-147-highbank 3.2.0-147.194\n linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194\n linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194\n linux-image-3.2.0-147-virtual 3.2.0-147.194\n linux-image-generic 3.2.0.147.161\n linux-image-generic-pae 3.2.0.147.161\n linux-image-highbank 3.2.0.147.161\n linux-image-powerpc 3.2.0.147.161\n linux-image-powerpc-smp 3.2.0.147.161\n linux-image-powerpc64-smp 3.2.0.147.161\n linux-image-server 3.2.0.147.161\n linux-image-virtual 3.2.0.147.161\n\nPlease note that the mitigation for CVE-2020-0543 requires a processor\nmicrocode update to be applied, either from your system manufacturer\nor via the intel-microcode package. The kernel update for this issue\nprovides the ability to disable the mitigation and to report\nvulnerability status. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well", "sources": [ { "db": "NVD", "id": "CVE-2020-0543" }, { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-0543", "trust": 1.9 }, { "db": "MCAFEE", "id": "SB10318", "trust": 1.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/07/14/5", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-534763", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "158010", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "158005", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "157993", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158183", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158015", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168421", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158198", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158189", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "157997", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158008", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158039", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158250", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158237", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158355", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158238", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158197", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158190", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-202006-630", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-161977", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-20-252-07", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-0543", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168851", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163956", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163758", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163772", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "id": "VAR-202006-0241", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-161977" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:15:08.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/06/09/june_2020_patch_tuesday/" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202707 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202680 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202706 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202677 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202432 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202771 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4393-1" }, { "title": "Ubuntu Security Notice: intel-microcode vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4385-1" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202433 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202758 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202431 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202842 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202757 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202679 - Security Advisory" }, { "title": "Ubuntu Security Notice: intel-microcode regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4385-2" }, { "title": "Ubuntu Security Notice: linux, linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4392-1" }, { "title": "Red Hat: Moderate: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202430 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202667 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202427 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202428 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4390-1" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4387-1" }, { "title": "Amazon Linux AMI: ALAS-2020-1396", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1396" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-0543 log" }, { "title": "Debian Security Advisories: DSA-4701-1 intel-microcode -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=954d2c33c2a4127c33b5f47731100050" }, { "title": "Red Hat: Important: kernel security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20203019 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux-gke-5.0, linux-oem-osp1 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4388-1" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4389-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=90d5b24197f663c23e5af8c971118de6" }, { "title": "Arch Linux Advisories: [ASA-202006-11] intel-ucode: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202006-11" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4391-1" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel\u00ae 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=85333ba63923f2976a4b451bcd61fd00" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202429 - Security Advisory" }, { "title": "Citrix Security Bulletins: Citrix Hypervisor Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=2b9d5984faab280f63afcb8a237cd1d2" }, { "title": "Amazon Linux 2: ALAS2-2020-1444", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2020-1444" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel\u00ae 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=2a42c56bb55866dbb1c5a179d43a79fa" }, { "title": "Debian Security Advisories: DSA-4699-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=24f2948c681d56f3f30c8ed6de9c4c9d" }, { "title": "Amazon Linux AMI: ALAS-2020-1401", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1401" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-012", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-012" }, { "title": "Debian Security Advisories: DSA-4698-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=88a848047667226a68bbe6de9bb29095" }, { "title": "Speculative-execution-attacks", "trust": 0.1, "url": "https://github.com/Stefan-Radu/Speculative-execution-attacks " }, { "title": "get-nist-details", "trust": 0.1, "url": "https://github.com/dmarcuccio-solace/get-nist-details " }, { "title": "spectre-meltdown", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra25/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra/spectre-meltdown-checker " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/critical-intel-flaws-fixed-in-active-management-technology/156458/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-0543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "trust": 1.3, "url": "https://usn.ubuntu.com/4393-1/" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "trust": 1.2, "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4385-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4387-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4388-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4389-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4390-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4391-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4392-1/" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10318" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 0.4, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0548" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/" }, { "trust": 0.2, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/srbds" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10318" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/459.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:2707" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-252-07" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/intel-microcode" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3322" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3027" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3028" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3029" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.0" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4385-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.0" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.0" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.0" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4393-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12654" } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-15T00:00:00", "db": "VULHUB", "id": "VHN-161977" }, { "date": "2020-06-15T00:00:00", "db": "VULMON", "id": "CVE-2020-0543" }, { "date": "2020-06-28T19:12:00", "db": "PACKETSTORM", "id": "168851" }, { "date": "2021-08-31T15:44:21", "db": "PACKETSTORM", "id": "163956" }, { "date": "2021-08-09T14:15:37", "db": "PACKETSTORM", "id": "163757" }, { "date": "2021-08-09T14:15:45", "db": "PACKETSTORM", "id": "163758" }, { "date": "2021-08-10T14:49:53", "db": "PACKETSTORM", "id": "163772" }, { "date": "2020-06-10T15:06:11", "db": "PACKETSTORM", "id": "158005" }, { "date": "2020-06-10T15:08:12", "db": "PACKETSTORM", "id": "158010" }, { "date": "2020-06-15T14:15:11.207000", "db": "NVD", "id": "CVE-2020-0543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-28T00:00:00", "db": "VULHUB", "id": "VHN-161977" }, { "date": "2022-04-28T00:00:00", "db": "VULMON", "id": "CVE-2020-0543" }, { "date": "2024-11-21T04:53:42.440000", "db": "NVD", "id": "CVE-2020-0543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" } ], "trust": 0.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian Security Advisory 4701-1", "sources": [ { "db": "PACKETSTORM", "id": "168851" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow, arbitrary, code execution", "sources": [ { "db": "PACKETSTORM", "id": "158010" } ], "trust": 0.1 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.