Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-3665 (GCVE-0-2018-3665)
Vulnerability from cvelistv5 – Published: 2018-06-21 20:00 – Updated: 2024-09-17 01:01- Information Disclosure
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel Corporation | Intel Core-based microprocessors |
Affected:
All
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T04:50:30.430Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "RHSA-2018:2164",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "USN-3696-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"name": "1041125",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041125"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "RHSA-2018:1944",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"name": "RHSA-2018:1852",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"name": "FreeBSD-SA-18:07",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"name": "1041124",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041124"
},
{
"name": "RHSA-2018:2165",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"name": "DSA-4232",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"name": "USN-3698-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"name": "USN-3696-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"name": "104460",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104460"
},
{
"name": "USN-3698-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"name": "RHSA-2019:1170",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"name": "RHSA-2019:1190",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX235745"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Core-based microprocessors",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
],
"datePublic": "2018-06-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-15T02:22:59.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "RHSA-2018:2164",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "USN-3696-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"name": "1041125",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041125"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "RHSA-2018:1944",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"name": "RHSA-2018:1852",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"name": "FreeBSD-SA-18:07",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"name": "1041124",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041124"
},
{
"name": "RHSA-2018:2165",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"name": "DSA-4232",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"name": "USN-3698-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"name": "USN-3696-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"name": "104460",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104460"
},
{
"name": "USN-3698-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"name": "RHSA-2019:1170",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"name": "RHSA-2019:1190",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX235745"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-06-13T00:00:00",
"ID": "CVE-2018-3665",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Core-based microprocessors",
"version": {
"version_data": [
{
"version_value": "All"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "RHSA-2018:2164",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "USN-3696-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"name": "1041125",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041125"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "RHSA-2018:1944",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"name": "RHSA-2018:1852",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"name": "FreeBSD-SA-18:07",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"name": "1041124",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041124"
},
{
"name": "RHSA-2018:2165",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"name": "DSA-4232",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"name": "USN-3698-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"name": "USN-3696-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"name": "104460",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104460"
},
{
"name": "USN-3698-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"name": "RHSA-2019:1170",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"name": "RHSA-2019:1190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
"refsource": "CONFIRM",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_31",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181016-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"name": "https://support.citrix.com/article/CTX235745",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX235745"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2018-3665",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2018-3665",
"datePublished": "2018-06-21T20:00:00.000Z",
"dateReserved": "2017-12-28T00:00:00.000Z",
"dateUpdated": "2024-09-17T01:01:36.405Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTFR-2019-AVI-213
Vulnerability from certfr_avis - Published: 2019-05-15 - Updated: 2019-05-15
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.5 x86_64 | ||
| Red Hat | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 8 aarch64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-1068",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1068"
},
{
"name": "CVE-2016-7913",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7913"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2017-1000407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000407"
},
{
"name": "CVE-2016-8633",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8633"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2018-18559",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18559"
},
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2017-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17558"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
}
],
"initial_release_date": "2019-05-15T00:00:00",
"last_revision_date": "2019-05-15T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-213",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1190 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1155 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1155"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1171 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1171"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1168 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1168"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1174 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1174"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1176 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1176"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1169 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1169"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1196 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1170 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1167 du 14 mai 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1167"
}
]
}
CERTFR-2018-AVI-358
Vulnerability from certfr_avis - Published: 2018-07-25 - Updated: 2018-07-25
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform 3.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-07-25T00:00:00",
"last_revision_date": "2018-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-358",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20182051-1 du 24 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182051-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20182048-1 du 24 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182048-1/"
}
]
}
CERTFR-2018-AVI-330
Vulnerability from certfr_avis - Published: 2018-07-11 - Updated: 2018-07-11
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat . Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 6 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
}
],
"initial_release_date": "2018-07-11T00:00:00",
"last_revision_date": "2018-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-330",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat . Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:2165 du 10 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:2164 du 10 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
}
]
}
CERTFR-2018-AVI-584
Vulnerability from certfr_avis - Published: 2018-12-05 - Updated: 2018-12-05
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.0 à 7.3.1 Patch 6 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.2.0 à 7.2.8 Patch 13 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.3.0 \u00e0 7.3.1 Patch 6",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.2.0 \u00e0 7.2.8 Patch 13",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-1068",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1068"
},
{
"name": "CVE-2018-1730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1730"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"name": "CVE-2018-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8037"
},
{
"name": "CVE-2017-16939",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16939"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-1728",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1728"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2018-1091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1091"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8034"
}
],
"initial_release_date": "2018-12-05T00:00:00",
"last_revision_date": "2018-12-05T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-12-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar SIEM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar SIEM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM du 4 d\u00e9cembre 2018",
"url": "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-apache-tomcat-as-used-in-ibm-qradar-siem-is-vulnerable-to-publicly-disclosed-vulnerability-cve-2018-8034-cve-2018-8037/"
}
]
}
CERTFR-2018-AVI-342
Vulnerability from certfr_avis - Published: 2018-07-13 - Updated: 2018-07-16
Une vulnérabilité a été découverte dans le noyau Linux de SUSE . Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-07-13T00:00:00",
"last_revision_date": "2018-07-16T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-342",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-13T00:00:00.000000"
},
{
"description": "Ajout d\u0027un bulletin",
"revision_date": "2018-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de SUSE . Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181946-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181946-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181944-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181944-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181949-1 du 13 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181949-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181948-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181948-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181947-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181947-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181940-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181940-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181942-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181942-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181945-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181945-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181943-1 du 12 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181943-1/"
}
]
}
CERTFR-2019-AVI-014
Vulnerability from certfr_avis - Published: 2019-01-10 - Updated: 2019-01-10
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 sur vMX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper ATP",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
},
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2019-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
},
{
"name": "CVE-2019-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
},
{
"name": "CVE-2019-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2019-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2019-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
},
{
"name": "CVE-2019-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
},
{
"name": "CVE-2019-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2019-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
},
{
"name": "CVE-2019-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
},
{
"name": "CVE-2019-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2019-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
},
{
"name": "CVE-2019-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2019-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2019-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
},
{
"name": "CVE-2017-11610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
},
{
"name": "CVE-2018-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
},
{
"name": "CVE-2019-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
},
{
"name": "CVE-2019-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2019-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2019-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
},
{
"name": "CVE-2019-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
},
{
"name": "CVE-2019-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
},
{
"name": "CVE-2019-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
},
{
"name": "CVE-2019-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
},
{
"name": "CVE-2018-5740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
},
{
"name": "CVE-2017-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
},
{
"name": "CVE-2019-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2019-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2017-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-10301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
}
],
"initial_release_date": "2019-01-10T00:00:00",
"last_revision_date": "2019-01-10T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-505
Vulnerability from certfr_avis - Published: 2018-10-19 - Updated: 2018-10-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8043"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-18344",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18344"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2017-18257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18257"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2018-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5814"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2018-7740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7740"
}
],
"initial_release_date": "2018-10-19T00:00:00",
"last_revision_date": "2018-10-19T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-505",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-19T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"revision_date": "2018-10-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183238-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181571-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181855-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20182344-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181377-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181173-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/"
}
]
}
CERTFR-2018-AVI-321
Vulnerability from certfr_avis - Published: 2018-07-03 - Updated: 2018-07-03
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-11508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11508"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-10021",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10021"
},
{
"name": "CVE-2018-6927",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6927"
},
{
"name": "CVE-2017-12154",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12154"
},
{
"name": "CVE-2018-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7757"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-7755",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7755"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-18257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18257"
},
{
"name": "CVE-2017-13695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13695"
},
{
"name": "CVE-2018-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5814"
},
{
"name": "CVE-2017-12193",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12193"
},
{
"name": "CVE-2018-10940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10940"
},
{
"name": "CVE-2018-5750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5750"
},
{
"name": "CVE-2017-18255",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18255"
},
{
"name": "CVE-2018-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1095"
}
],
"initial_release_date": "2018-07-03T00:00:00",
"last_revision_date": "2018-07-03T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-321",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3698-2 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3696-2 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3697-2 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3697-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3696-1 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3695-1 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3695-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3695-2 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3695-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3697-1 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3697-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3698-1 du 02 juillet 2018",
"url": "https://usn.ubuntu.com/3698-1/"
}
]
}
CERTFR-2018-AVI-382
Vulnerability from certfr_avis - Published: 2018-08-10 - Updated: 2018-08-10
Une vulnérabilité a été découverte dans le noyau Linux de SUSE. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-08-10T00:00:00",
"last_revision_date": "2018-08-10T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182267-1 du\u00a08 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182267-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182270-1 du\u00a08 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182270-1/"
}
],
"reference": "CERTFR-2018-AVI-382",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de SUSE. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0\u00a0la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182269-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182269-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182254-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182254-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182268-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182268-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182271-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182271-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182266-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182266-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182255-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182255-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182248-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182248-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182264-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182264-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182263-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182263-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182262-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182262-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182270-1 du 8 ao\u00fbt 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182267-1 du 8 ao\u00fbt 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182250-1 du 8 ao\u00fbt 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182250-1/"
}
]
}
CERTFR-2018-AVI-292
Vulnerability from certfr_avis - Published: 2018-06-15 - Updated: 2018-06-15
Une vulnérabilité a été découverte dans le noyau Linux de RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power 9 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux pour Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-06-15T00:00:00",
"last_revision_date": "2018-06-15T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-292",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de RedHat. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1852 du 14 juin 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
}
]
}
CERTFR-2018-AVI-290
Vulnerability from certfr_avis - Published: 2018-06-14 - Updated: 2018-06-14
Une vulnérabilité a été découverte dans Xen. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen toutes versions utilisant un processeur de type Intel Core",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-06-14T00:00:00",
"last_revision_date": "2018-06-14T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-290",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Xen. Elle permet \u00e0 un attaquant\nde provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-267 du 13 juin 2018",
"url": "https://xenbits.xen.org/xsa/advisory-267.html"
}
]
}
CERTFR-2018-AVI-362
Vulnerability from certfr_avis - Published: 2018-07-30 - Updated: 2018-07-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Legacy Software 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1118"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1000200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1120"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"initial_release_date": "2018-07-30T00:00:00",
"last_revision_date": "2018-07-30T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-362",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182091-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182099-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182112-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182094-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182094-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182088-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182090-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182090-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182103-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182096-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182096-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182093-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182109-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182098-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182098-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182104-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182095-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182095-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182105-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182105-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182107-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182107-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182108-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182108-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182106-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182092-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182086-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182087-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182087-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182115-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182115-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182114-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182114-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182101-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182101-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182111-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182111-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182102-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182102-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182113-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182097-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182110-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182110-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182100-1 du 27 juillet 2018",
"url": null
}
]
}
CERTFR-2019-AVI-308
Vulnerability from certfr_avis - Published: 2019-07-09 - Updated: 2019-07-09
Une vulnérabilité a été découverte dans Palo Alto WildFire Appliance. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WildFire Appliance (WF-500) versions 8.1.x ant\u00e9rieures \u00e0 8.1.9",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "WildFire Appliance (WF-500) versions ant\u00e9rieures \u00e0 8.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2019-07-09T00:00:00",
"last_revision_date": "2019-07-09T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-308",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Palo Alto WildFire Appliance.\nElle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Palo Alto WildFire Appliance",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto 154 du 08 juillet 2019",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/154"
}
]
}
CERTFR-2018-AVI-329
Vulnerability from certfr_avis - Published: 2018-07-10 - Updated: 2018-07-10
De multiples vulnérabilités ont été découvertes dans les produits Apple . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | OS X El Capitan 10.11.6 sans le correctif de sécurité 2018-004 | ||
| Apple | N/A | iCloud for Windows versions antérieures à 7.6 | ||
| Apple | Safari | Safari versions antérieures à 11.1.2 | ||
| Apple | N/A | watchOS versions antérieures à 4.3.2 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.6 | ||
| Apple | macOS | macOS Sierra versions 10.12.6 sans le correctif de sécurité 2018-004 | ||
| Apple | N/A | iOS versions antérieures à 11.4.1 | ||
| Apple | N/A | iTunes versions antérieures à 12.8 | ||
| Apple | N/A | tvOS versions antérieures à 11.4.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OS X El Capitan 10.11.6 sans le correctif de s\u00e9curit\u00e9 2018-004",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud for Windows versions ant\u00e9rieures \u00e0 7.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 11.1.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 4.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions 10.12.6 sans le correctif de s\u00e9curit\u00e9 2018-004",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 11.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 11.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4274",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4274"
},
{
"name": "CVE-2018-4266",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4266"
},
{
"name": "CVE-2018-4270",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4270"
},
{
"name": "CVE-2018-4260",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4260"
},
{
"name": "CVE-2018-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4293"
},
{
"name": "CVE-2018-4248",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4248"
},
{
"name": "CVE-2018-4280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4280"
},
{
"name": "CVE-2018-4275",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4275"
},
{
"name": "CVE-2018-4284",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4284"
},
{
"name": "CVE-2018-4279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4279"
},
{
"name": "CVE-2018-4263",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4263"
},
{
"name": "CVE-2018-4271",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4271"
},
{
"name": "CVE-2018-4290",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4290"
},
{
"name": "CVE-2018-4282",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4282"
},
{
"name": "CVE-2018-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4269"
},
{
"name": "CVE-2018-4277",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4277"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-4268",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4268"
},
{
"name": "CVE-2018-4178",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4178"
},
{
"name": "CVE-2018-4267",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4267"
},
{
"name": "CVE-2018-4289",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4289"
},
{
"name": "CVE-2018-4264",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4264"
},
{
"name": "CVE-2018-4265",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4265"
},
{
"name": "CVE-2018-4278",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4278"
},
{
"name": "CVE-2018-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4285"
},
{
"name": "CVE-2018-4262",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4262"
},
{
"name": "CVE-2018-4272",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4272"
},
{
"name": "CVE-2018-4273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4273"
},
{
"name": "CVE-2018-4283",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4283"
},
{
"name": "CVE-2018-4261",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4261"
}
],
"initial_release_date": "2018-07-10T00:00:00",
"last_revision_date": "2018-07-10T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-329",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208936 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208936"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208935 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208935"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208934 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208934"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208938 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208938"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208932 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208932"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208937 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208937"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208933 du 09 juillet 2018",
"url": "https://support.apple.com/en-gb/HT208933"
}
]
}
CERTFR-2018-AVI-319
Vulnerability from certfr_avis - Published: 2018-07-02 - Updated: 2018-07-02
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 | ||
| SUSE | N/A | SUSE Enterprise Storage 4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
}
],
"initial_release_date": "2018-07-02T00:00:00",
"last_revision_date": "2018-07-02T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-319",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181849-1 du 29 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181849-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181855-1 du 29 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181846-1 du 29 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181846-1/"
}
]
}
CERTFR-2018-AVI-312
Vulnerability from certfr_avis - Published: 2018-06-28 - Updated: 2018-06-28
Une vulnérabilité a été découverte dans le noyau Linux de SUSE. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-06-28T00:00:00",
"last_revision_date": "2018-06-28T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-312",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de SUSE. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1821-1 du 27 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181821-1/"
}
]
}
CERTFR-2018-AVI-296
Vulnerability from certfr_avis - Published: 2018-06-20 - Updated: 2018-06-20
Une vulnérabilité a été découverte dans le noyau Linux de RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 7 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-06-20T00:00:00",
"last_revision_date": "2018-06-20T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-296",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de RedHat. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1944 du 19 juin 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
}
]
}
CERTFR-2018-AVI-295
Vulnerability from certfr_avis - Published: 2018-06-18 - Updated: 2018-06-18
Une vulnérabilité a été découverte dans Citrix XenServer. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "XenServer 7.4",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "XenServer 7.5",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "XenServer 7.3",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "XenServer 7.1 LTSR Cumulative Update 1",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "XenServer 7.0",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
}
],
"initial_release_date": "2018-06-18T00:00:00",
"last_revision_date": "2018-06-18T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-295",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Citrix XenServer. Elle permet \u00e0\nun attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Citrix XenServer",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX235745 du 15 juin 2018",
"url": "https://support.citrix.com/article/CTX235745"
}
]
}
CERTFR-2018-AVI-308
Vulnerability from certfr_avis - Published: 2018-06-27 - Updated: 2018-06-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"initial_release_date": "2018-06-27T00:00:00",
"last_revision_date": "2018-06-27T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-308",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1816-1 du 26 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1/"
}
]
}
CERTFR-2018-AVI-299
Vulnerability from certfr_avis - Published: 2018-06-21 - Updated: 2018-06-21
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
}
],
"initial_release_date": "2018-06-21T00:00:00",
"last_revision_date": "2018-06-21T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-299",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1761-1 du 20 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1762-1 du 20 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1/"
}
]
}
CERTFR-2018-AVI-301
Vulnerability from certfr_avis - Published: 2018-06-22 - Updated: 2018-06-22
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"initial_release_date": "2018-06-22T00:00:00",
"last_revision_date": "2018-06-22T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-301",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1772-1 du 21 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1/"
}
]
}
CVE-2018-3665
Vulnerability from fstec - Published: 09.02.2016{
"CVSS 2.0": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Intel Corp., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Juniper Networks Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Intel Core), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), \u0434\u043e 18.3R1 (Junos Space), \u043e\u0442 4.0 \u0434\u043e 4.4.137 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.6 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.138\n\n\u0414\u043b\u044f Junos Space:\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST\n\n\u0414\u043b\u044f Intel Core:\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 xen \u0434\u043e 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.02.2016",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.12.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.02.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-00719",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-3665",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Intel Core, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Junos Space, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Lazy FPU context switching \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Lazy FPU context switching \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 FPU \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.138\nhttps://ubuntu.com/security/notices/USN-3696-1\nhttps://ubuntu.com/security/notices/USN-3696-2\nhttps://ubuntu.com/security/notices/USN-3698-1\nhttps://ubuntu.com/security/notices/USN-3698-2\nhttps://usn.ubuntu.com/usn/usn-3696-1\nhttps://usn.ubuntu.com/usn/usn-3696-2\nhttps://usn.ubuntu.com/usn/usn-3698-1\nhttps://usn.ubuntu.com/usn/usn-3698-2\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://www.cve.org/CVERecord?id=CVE-2018-3665\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html\nhttps://xenbits.xen.org/xsa/advisory-267.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,7)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,6)\n\u041d\u0435\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 0)"
}
GHSA-723G-X9C7-6562
Vulnerability from github – Published: 2022-05-13 01:09 – Updated: 2022-05-13 01:09System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
{
"affected": [],
"aliases": [
"CVE-2018-3665"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-06-21T20:29:00Z",
"severity": "MODERATE"
},
"details": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"id": "GHSA-723g-x9c7-6562",
"modified": "2022-05-13T01:09:37Z",
"published": "2022-05-13T01:09:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3665"
},
{
"type": "WEB",
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3698-2"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3698-1"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3696-2"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3696-1"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX235745"
},
{
"type": "WEB",
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20181016-0001"
},
{
"type": "WEB",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"type": "WEB",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"type": "WEB",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/104460"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1041124"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1041125"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2018-3665
Vulnerability from fkie_nvd - Published: 2018-06-21 20:29 - Updated: 2024-11-21 04:05| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://www.securityfocus.com/bid/104460 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://www.securitytracker.com/id/1041124 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://www.securitytracker.com/id/1041125 | Third Party Advisory, VDB Entry | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1852 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1944 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2164 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2165 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:1170 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:1190 | Third Party Advisory | |
| secure@intel.com | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html | Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html | Third Party Advisory | |
| secure@intel.com | https://nvidia.custhelp.com/app/answers/detail/a_id/4787 | Third Party Advisory | |
| secure@intel.com | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc | Third Party Advisory | |
| secure@intel.com | https://security.netapp.com/advisory/ntap-20181016-0001/ | Third Party Advisory | |
| secure@intel.com | https://security.paloaltonetworks.com/CVE-2018-3665 | Third Party Advisory | |
| secure@intel.com | https://support.citrix.com/article/CTX235745 | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3696-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3696-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3698-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3698-2/ | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4232 | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html | Vendor Advisory | |
| secure@intel.com | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
| secure@intel.com | https://www.synology.com/support/security/Synology_SA_18_31 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104460 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041124 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041125 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1852 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1944 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2164 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2165 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1170 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1190 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://nvidia.custhelp.com/app/answers/detail/a_id/4787 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20181016-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2018-3665 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX235745 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3696-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3696-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3698-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3698-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4232 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_31 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | core_i3 | 330e | |
| intel | core_i3 | 330m | |
| intel | core_i3 | 330um | |
| intel | core_i3 | 350m | |
| intel | core_i3 | 370m | |
| intel | core_i3 | 380m | |
| intel | core_i3 | 380um | |
| intel | core_i3 | 390m | |
| intel | core_i3 | 530 | |
| intel | core_i3 | 540 | |
| intel | core_i3 | 550 | |
| intel | core_i3 | 560 | |
| intel | core_i3 | 2100 | |
| intel | core_i3 | 2100t | |
| intel | core_i3 | 2102 | |
| intel | core_i3 | 2105 | |
| intel | core_i3 | 2115c | |
| intel | core_i3 | 2120 | |
| intel | core_i3 | 2120t | |
| intel | core_i3 | 2125 | |
| intel | core_i3 | 2130 | |
| intel | core_i3 | 2310e | |
| intel | core_i3 | 2310m | |
| intel | core_i3 | 2312m | |
| intel | core_i3 | 2328m | |
| intel | core_i3 | 2330e | |
| intel | core_i3 | 2330m | |
| intel | core_i3 | 2340ue | |
| intel | core_i3 | 2348m | |
| intel | core_i3 | 2350m | |
| intel | core_i3 | 2357m | |
| intel | core_i3 | 2365m | |
| intel | core_i3 | 2367m | |
| intel | core_i3 | 2370m | |
| intel | core_i3 | 2375m | |
| intel | core_i3 | 2377m | |
| intel | core_i3 | 3110m | |
| intel | core_i3 | 3115c | |
| intel | core_i3 | 3120m | |
| intel | core_i3 | 3120me | |
| intel | core_i3 | 3130m | |
| intel | core_i3 | 3210 | |
| intel | core_i3 | 3217u | |
| intel | core_i3 | 3217ue | |
| intel | core_i3 | 3220 | |
| intel | core_i3 | 3220t | |
| intel | core_i3 | 3225 | |
| intel | core_i3 | 3227u | |
| intel | core_i3 | 3229y | |
| intel | core_i3 | 3240 | |
| intel | core_i3 | 3240t | |
| intel | core_i3 | 3245 | |
| intel | core_i3 | 3250 | |
| intel | core_i3 | 3250t | |
| intel | core_i3 | 4000m | |
| intel | core_i3 | 4005u | |
| intel | core_i3 | 4010u | |
| intel | core_i3 | 4010y | |
| intel | core_i3 | 4012y | |
| intel | core_i3 | 4020y | |
| intel | core_i3 | 4025u | |
| intel | core_i3 | 4030u | |
| intel | core_i3 | 4030y | |
| intel | core_i3 | 4100e | |
| intel | core_i3 | 4100m | |
| intel | core_i3 | 4100u | |
| intel | core_i3 | 4102e | |
| intel | core_i3 | 4110e | |
| intel | core_i3 | 4110m | |
| intel | core_i3 | 4112e | |
| intel | core_i3 | 4120u | |
| intel | core_i3 | 4130 | |
| intel | core_i3 | 4130t | |
| intel | core_i3 | 4150 | |
| intel | core_i3 | 4150t | |
| intel | core_i3 | 4158u | |
| intel | core_i3 | 4160 | |
| intel | core_i3 | 4160t | |
| intel | core_i3 | 4170 | |
| intel | core_i3 | 4170t | |
| intel | core_i3 | 4330 | |
| intel | core_i3 | 4330t | |
| intel | core_i3 | 4330te | |
| intel | core_i3 | 4340 | |
| intel | core_i3 | 4340te | |
| intel | core_i3 | 4350 | |
| intel | core_i3 | 4350t | |
| intel | core_i3 | 4360 | |
| intel | core_i3 | 4360t | |
| intel | core_i3 | 4370 | |
| intel | core_i3 | 4370t | |
| intel | core_i3 | 5005u | |
| intel | core_i3 | 5010u | |
| intel | core_i3 | 5015u | |
| intel | core_i3 | 5020u | |
| intel | core_i3 | 5157u | |
| intel | core_i3 | 6006u | |
| intel | core_i3 | 6098p | |
| intel | core_i3 | 6100 | |
| intel | core_i3 | 6100e | |
| intel | core_i3 | 6100h | |
| intel | core_i3 | 6100t | |
| intel | core_i3 | 6100te | |
| intel | core_i3 | 6100u | |
| intel | core_i3 | 6102e | |
| intel | core_i3 | 6157u | |
| intel | core_i3 | 6167u | |
| intel | core_i3 | 6300 | |
| intel | core_i3 | 6300t | |
| intel | core_i3 | 6320 | |
| intel | core_i3 | 8100 | |
| intel | core_i3 | 8350k | |
| intel | core_i5 | 430m | |
| intel | core_i5 | 430um | |
| intel | core_i5 | 450m | |
| intel | core_i5 | 460m | |
| intel | core_i5 | 470um | |
| intel | core_i5 | 480m | |
| intel | core_i5 | 520e | |
| intel | core_i5 | 520m | |
| intel | core_i5 | 520um | |
| intel | core_i5 | 540m | |
| intel | core_i5 | 540um | |
| intel | core_i5 | 560m | |
| intel | core_i5 | 560um | |
| intel | core_i5 | 580m | |
| intel | core_i5 | 650 | |
| intel | core_i5 | 655k | |
| intel | core_i5 | 660 | |
| intel | core_i5 | 661 | |
| intel | core_i5 | 670 | |
| intel | core_i5 | 680 | |
| intel | core_i5 | 750 | |
| intel | core_i5 | 750s | |
| intel | core_i5 | 760 | |
| intel | core_i5 | 2300 | |
| intel | core_i5 | 2310 | |
| intel | core_i5 | 2320 | |
| intel | core_i5 | 2380p | |
| intel | core_i5 | 2390t | |
| intel | core_i5 | 2400 | |
| intel | core_i5 | 2400s | |
| intel | core_i5 | 2405s | |
| intel | core_i5 | 2410m | |
| intel | core_i5 | 2430m | |
| intel | core_i5 | 2435m | |
| intel | core_i5 | 2450m | |
| intel | core_i5 | 2450p | |
| intel | core_i5 | 2467m | |
| intel | core_i5 | 2500 | |
| intel | core_i5 | 2500k | |
| intel | core_i5 | 2500s | |
| intel | core_i5 | 2500t | |
| intel | core_i5 | 2510e | |
| intel | core_i5 | 2515e | |
| intel | core_i5 | 2520m | |
| intel | core_i5 | 2537m | |
| intel | core_i5 | 2540m | |
| intel | core_i5 | 2550k | |
| intel | core_i5 | 2557m | |
| intel | core_i5 | 3210m | |
| intel | core_i5 | 3230m | |
| intel | core_i5 | 3317u | |
| intel | core_i5 | 3320m | |
| intel | core_i5 | 3330 | |
| intel | core_i5 | 3330s | |
| intel | core_i5 | 3337u | |
| intel | core_i5 | 3339y | |
| intel | core_i5 | 3340 | |
| intel | core_i5 | 3340m | |
| intel | core_i5 | 3340s | |
| intel | core_i5 | 3350p | |
| intel | core_i5 | 3360m | |
| intel | core_i5 | 3380m | |
| intel | core_i5 | 3427u | |
| intel | core_i5 | 3437u | |
| intel | core_i5 | 3439y | |
| intel | core_i5 | 3450 | |
| intel | core_i5 | 3450s | |
| intel | core_i5 | 3470 | |
| intel | core_i5 | 3470s | |
| intel | core_i5 | 3470t | |
| intel | core_i5 | 3475s | |
| intel | core_i5 | 3550 | |
| intel | core_i5 | 3550s | |
| intel | core_i5 | 3570 | |
| intel | core_i5 | 3570k | |
| intel | core_i5 | 3570s | |
| intel | core_i5 | 3570t | |
| intel | core_i5 | 3610me | |
| intel | core_i5 | 4200h | |
| intel | core_i5 | 4200m | |
| intel | core_i5 | 4200u | |
| intel | core_i5 | 4200y | |
| intel | core_i5 | 4202y | |
| intel | core_i5 | 4210h | |
| intel | core_i5 | 4210m | |
| intel | core_i5 | 4210u | |
| intel | core_i5 | 4210y | |
| intel | core_i5 | 4220y | |
| intel | core_i5 | 4250u | |
| intel | core_i5 | 4258u | |
| intel | core_i5 | 4260u | |
| intel | core_i5 | 4278u | |
| intel | core_i5 | 4288u | |
| intel | core_i5 | 4300m | |
| intel | core_i5 | 4300u | |
| intel | core_i5 | 4300y | |
| intel | core_i5 | 4302y | |
| intel | core_i5 | 4308u | |
| intel | core_i5 | 4310m | |
| intel | core_i5 | 4310u | |
| intel | core_i5 | 4330m | |
| intel | core_i5 | 4340m | |
| intel | core_i5 | 4350u | |
| intel | core_i5 | 4360u | |
| intel | core_i5 | 4400e | |
| intel | core_i5 | 4402e | |
| intel | core_i5 | 4402ec | |
| intel | core_i5 | 4410e | |
| intel | core_i5 | 4422e | |
| intel | core_i5 | 4430 | |
| intel | core_i5 | 4430s | |
| intel | core_i5 | 4440 | |
| intel | core_i5 | 4440s | |
| intel | core_i5 | 4460 | |
| intel | core_i5 | 4460s | |
| intel | core_i5 | 4460t | |
| intel | core_i5 | 4570 | |
| intel | core_i5 | 4570r | |
| intel | core_i5 | 4570s | |
| intel | core_i5 | 4570t | |
| intel | core_i5 | 4570te | |
| intel | core_i5 | 4590 | |
| intel | core_i5 | 4590s | |
| intel | core_i5 | 4590t | |
| intel | core_i5 | 4670 | |
| intel | core_i5 | 4670k | |
| intel | core_i5 | 4670r | |
| intel | core_i5 | 4670s | |
| intel | core_i5 | 4670t | |
| intel | core_i5 | 4690 | |
| intel | core_i5 | 4690k | |
| intel | core_i5 | 4690s | |
| intel | core_i5 | 4690t | |
| intel | core_i5 | 5200u | |
| intel | core_i5 | 5250u | |
| intel | core_i5 | 5257u | |
| intel | core_i5 | 5287u | |
| intel | core_i5 | 5300u | |
| intel | core_i5 | 5350h | |
| intel | core_i5 | 5350u | |
| intel | core_i5 | 5575r | |
| intel | core_i5 | 5675c | |
| intel | core_i5 | 5675r | |
| intel | core_i5 | 6200u | |
| intel | core_i5 | 6260u | |
| intel | core_i5 | 6267u | |
| intel | core_i5 | 6287u | |
| intel | core_i5 | 6300hq | |
| intel | core_i5 | 6300u | |
| intel | core_i5 | 6350hq | |
| intel | core_i5 | 6360u | |
| intel | core_i5 | 6400 | |
| intel | core_i5 | 6400t | |
| intel | core_i5 | 6402p | |
| intel | core_i5 | 6440eq | |
| intel | core_i5 | 6440hq | |
| intel | core_i5 | 6442eq | |
| intel | core_i5 | 6500 | |
| intel | core_i5 | 6500t | |
| intel | core_i5 | 6500te | |
| intel | core_i5 | 6585r | |
| intel | core_i5 | 6600 | |
| intel | core_i5 | 6600k | |
| intel | core_i5 | 6600t | |
| intel | core_i5 | 6685r | |
| intel | core_i5 | 8250u | |
| intel | core_i5 | 8350u | |
| intel | core_i5 | 8400 | |
| intel | core_i5 | 8600k | |
| intel | core_i7 | 7y75 | |
| intel | core_i7 | 610e | |
| intel | core_i7 | 620le | |
| intel | core_i7 | 620lm | |
| intel | core_i7 | 620m | |
| intel | core_i7 | 620ue | |
| intel | core_i7 | 620um | |
| intel | core_i7 | 640lm | |
| intel | core_i7 | 640m | |
| intel | core_i7 | 640um | |
| intel | core_i7 | 660lm | |
| intel | core_i7 | 660ue | |
| intel | core_i7 | 660um | |
| intel | core_i7 | 680um | |
| intel | core_i7 | 720qm | |
| intel | core_i7 | 740qm | |
| intel | core_i7 | 820qm | |
| intel | core_i7 | 840qm | |
| intel | core_i7 | 860 | |
| intel | core_i7 | 860s | |
| intel | core_i7 | 870 | |
| intel | core_i7 | 870s | |
| intel | core_i7 | 875k | |
| intel | core_i7 | 880 | |
| intel | core_i7 | 920 | |
| intel | core_i7 | 920xm | |
| intel | core_i7 | 930 | |
| intel | core_i7 | 940 | |
| intel | core_i7 | 940xm | |
| intel | core_i7 | 950 | |
| intel | core_i7 | 960 | |
| intel | core_i7 | 965 | |
| intel | core_i7 | 970 | |
| intel | core_i7 | 975 | |
| intel | core_i7 | 980 | |
| intel | core_i7 | 980x | |
| intel | core_i7 | 990x | |
| intel | core_i7 | 2600 | |
| intel | core_i7 | 2600k | |
| intel | core_i7 | 2600s | |
| intel | core_i7 | 2610ue | |
| intel | core_i7 | 2617m | |
| intel | core_i7 | 2620m | |
| intel | core_i7 | 2629m | |
| intel | core_i7 | 2630qm | |
| intel | core_i7 | 2635qm | |
| intel | core_i7 | 2637m | |
| intel | core_i7 | 2640m | |
| intel | core_i7 | 2649m | |
| intel | core_i7 | 2655le | |
| intel | core_i7 | 2657m | |
| intel | core_i7 | 2670qm | |
| intel | core_i7 | 2675qm | |
| intel | core_i7 | 2677m | |
| intel | core_i7 | 2700k | |
| intel | core_i7 | 2710qe | |
| intel | core_i7 | 2715qe | |
| intel | core_i7 | 2720qm | |
| intel | core_i7 | 2760qm | |
| intel | core_i7 | 2820qm | |
| intel | core_i7 | 2860qm | |
| intel | core_i7 | 2920xm | |
| intel | core_i7 | 2960xm | |
| intel | core_i7 | 3517u | |
| intel | core_i7 | 3517ue | |
| intel | core_i7 | 3520m | |
| intel | core_i7 | 3537u | |
| intel | core_i7 | 3540m | |
| intel | core_i7 | 3555le | |
| intel | core_i7 | 3610qe | |
| intel | core_i7 | 3610qm | |
| intel | core_i7 | 3612qe | |
| intel | core_i7 | 3612qm | |
| intel | core_i7 | 3615qe | |
| intel | core_i7 | 3615qm | |
| intel | core_i7 | 3630qm | |
| intel | core_i7 | 3632qm | |
| intel | core_i7 | 3635qm | |
| intel | core_i7 | 3667u | |
| intel | core_i7 | 3687u | |
| intel | core_i7 | 3689y | |
| intel | core_i7 | 3720qm | |
| intel | core_i7 | 3740qm | |
| intel | core_i7 | 3770 | |
| intel | core_i7 | 3770k | |
| intel | core_i7 | 3770s | |
| intel | core_i7 | 3770t | |
| intel | core_i7 | 3820qm | |
| intel | core_i7 | 3840qm | |
| intel | core_i7 | 4500u | |
| intel | core_i7 | 4510u | |
| intel | core_i7 | 4550u | |
| intel | core_i7 | 4558u | |
| intel | core_i7 | 4578u | |
| intel | core_i7 | 4600m | |
| intel | core_i7 | 4600u | |
| intel | core_i7 | 4610m | |
| intel | core_i7 | 4610y | |
| intel | core_i7 | 4650u | |
| intel | core_i7 | 4700ec | |
| intel | core_i7 | 4700eq | |
| intel | core_i7 | 4700hq | |
| intel | core_i7 | 4700mq | |
| intel | core_i7 | 4702ec | |
| intel | core_i7 | 4702hq | |
| intel | core_i7 | 4702mq | |
| intel | core_i7 | 4710hq | |
| intel | core_i7 | 4710mq | |
| intel | core_i7 | 4712hq | |
| intel | core_i7 | 4712mq | |
| intel | core_i7 | 4720hq | |
| intel | core_i7 | 4722hq | |
| intel | core_i7 | 4750hq | |
| intel | core_i7 | 4760hq | |
| intel | core_i7 | 4765t | |
| intel | core_i7 | 4770 | |
| intel | core_i7 | 4770hq | |
| intel | core_i7 | 4770k | |
| intel | core_i7 | 4770r | |
| intel | core_i7 | 4770s | |
| intel | core_i7 | 4770t | |
| intel | core_i7 | 4770te | |
| intel | core_i7 | 4771 | |
| intel | core_i7 | 4785t | |
| intel | core_i7 | 4790 | |
| intel | core_i7 | 4790k | |
| intel | core_i7 | 4790s | |
| intel | core_i7 | 4790t | |
| intel | core_i7 | 4800mq | |
| intel | core_i7 | 4810mq | |
| intel | core_i7 | 4850hq | |
| intel | core_i7 | 4860hq | |
| intel | core_i7 | 4870hq | |
| intel | core_i7 | 4900mq | |
| intel | core_i7 | 4910mq | |
| intel | core_i7 | 4950hq | |
| intel | core_i7 | 4960hq | |
| intel | core_i7 | 4980hq | |
| intel | core_i7 | 5500u | |
| intel | core_i7 | 5550u | |
| intel | core_i7 | 5557u | |
| intel | core_i7 | 5600u | |
| intel | core_i7 | 5650u | |
| intel | core_i7 | 5700eq | |
| intel | core_i7 | 5700hq | |
| intel | core_i7 | 5750hq | |
| intel | core_i7 | 5775c | |
| intel | core_i7 | 5775r | |
| intel | core_i7 | 5850eq | |
| intel | core_i7 | 5850hq | |
| intel | core_i7 | 5950hq | |
| intel | core_i7 | 7500u | |
| intel | core_i7 | 7560u | |
| intel | core_i7 | 7567u | |
| intel | core_i7 | 7600u | |
| intel | core_i7 | 7660u | |
| intel | core_i7 | 7700 | |
| intel | core_i7 | 7700hq | |
| intel | core_i7 | 7700k | |
| intel | core_i7 | 7700t | |
| intel | core_i7 | 7820eq | |
| intel | core_i7 | 7820hk | |
| intel | core_i7 | 7820hq | |
| intel | core_i7 | 7920hq | |
| intel | core_i7 | 8550u | |
| intel | core_i7 | 8650u | |
| intel | core_i7 | 8700 | |
| intel | core_i7 | 8700k | |
| intel | core_m | 5y10 | |
| intel | core_m | 5y10a | |
| intel | core_m | 5y10c | |
| intel | core_m | 5y31 | |
| intel | core_m | 5y51 | |
| intel | core_m | 5y70 | |
| intel | core_m | 5y71 | |
| intel | core_m3 | 6y30 | |
| intel | core_m3 | 7y30 | |
| intel | core_m3 | 7y32 | |
| intel | core_m5 | 6y54 | |
| intel | core_m5 | 6y57 | |
| intel | core_m7 | 6y75 | |
| citrix | xenserver | 7.0 | |
| citrix | xenserver | 7.1 | |
| citrix | xenserver | 7.3 | |
| citrix | xenserver | 7.4 | |
| citrix | xenserver | 7.5 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| freebsd | freebsd | 11.0 | |
| freebsd | freebsd | 11.1 | |
| freebsd | freebsd | 11.2 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| redhat | enterprise_linux_workstation | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
"matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
"matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
"matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
"matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
"matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
"matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
"matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
"matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
"matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
"matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
"matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
"matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
"matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "405F950F-0772-41A3-8B72-B67151CC1376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B5647AEA-DCE6-4950-A7EB-05465ECDDE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "55FD399E-959A-4FB6-B049-AA73F0DFF9CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "49422CA5-DF4B-4FE4-B408-81B637BE1287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:xenserver:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "49D662D7-33DF-4DB3-946E-E9E410DC96CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53E56F4F-B418-44DD-9C97-7276A4C58F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C5753931-556B-4EEC-B510-751BA3613CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F5288B41-ED07-487E-BECD-59978D0F0686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*",
"matchCriteriaId": "AE8DED75-8C97-476F-805B-7A2F17B6BC11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*",
"matchCriteriaId": "B061040C-AB62-4ED6-8F4A-A49DA6753C4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel."
},
{
"lang": "es",
"value": "El software de sistema que emplea la t\u00e9cnica de restauraci\u00f3n de estado Lazy FP en los sistemas que emplean microprocesadores de Intel Core podr\u00edan permitir que un proceso local infiera datos de otro proceso mediante un canal lateral de ejecuci\u00f3n especulativa."
}
],
"id": "CVE-2018-3665",
"lastModified": "2024-11-21T04:05:51.690",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-21T20:29:00.373",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104460"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041124"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041125"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX235745"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX235745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2018-3665
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-3665",
"description": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"id": "GSD-2018-3665",
"references": [
"https://www.suse.com/security/cve/CVE-2018-3665.html",
"https://www.debian.org/security/2018/dsa-4232",
"https://access.redhat.com/errata/RHSA-2019:1190",
"https://access.redhat.com/errata/RHSA-2019:1170",
"https://access.redhat.com/errata/RHSA-2018:2165",
"https://access.redhat.com/errata/RHSA-2018:2164",
"https://access.redhat.com/errata/RHSA-2018:1944",
"https://access.redhat.com/errata/RHSA-2018:1852",
"https://ubuntu.com/security/CVE-2018-3665",
"https://linux.oracle.com/cve/CVE-2018-3665.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-3665"
],
"details": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"id": "GSD-2018-3665",
"modified": "2023-12-13T01:22:43.253764Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-06-13T00:00:00",
"ID": "CVE-2018-3665",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Core-based microprocessors",
"version": {
"version_data": [
{
"version_value": "All"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "RHSA-2018:2164",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "USN-3696-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"name": "1041125",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041125"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "RHSA-2018:1944",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"name": "RHSA-2018:1852",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"name": "FreeBSD-SA-18:07",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"name": "1041124",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041124"
},
{
"name": "RHSA-2018:2165",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"name": "DSA-4232",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"name": "USN-3698-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"name": "USN-3696-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"name": "104460",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104460"
},
{
"name": "USN-3698-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"name": "RHSA-2019:1170",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"name": "RHSA-2019:1190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
"refsource": "CONFIRM",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_31",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181016-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"name": "https://support.citrix.com/article/CTX235745",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX235745"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2018-3665",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-3665"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_31",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_31"
},
{
"name": "DSA-4232",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4232"
},
{
"name": "https://support.citrix.com/article/CTX235745",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX235745"
},
{
"name": "FreeBSD-SA-18:07",
"refsource": "FREEBSD",
"tags": [
"Third Party Advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"
},
{
"name": "RHSA-2018:1944",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1944"
},
{
"name": "RHSA-2018:1852",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1852"
},
{
"name": "1041125",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041125"
},
{
"name": "1041124",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1041124"
},
{
"name": "104460",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104460"
},
{
"name": "USN-3698-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"name": "USN-3696-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"name": "USN-3696-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"name": "RHSA-2018:2165",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"name": "RHSA-2018:2164",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "USN-3698-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20181016-0001/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20181016-0001/"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"name": "RHSA-2019:1170",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1170"
},
{
"name": "RHSA-2019:1190",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1190"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2018-3665",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2018-3665"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 4.0
}
},
"lastModifiedDate": "2021-06-09T16:24Z",
"publishedDate": "2018-06-21T20:29Z"
}
}
}
CNVD-2018-13392
Vulnerability from cnvd - Published: 2018-07-18厂商已发布漏洞修复程序,请及时关注更新: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=58122bf1d856a4ea9581d62a07c557d997d46a19
| Name | Intel Core Microprocessors 0 |
|---|
{
"bids": {
"bid": {
"bidNumber": "104460"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-3665"
}
},
"description": "Intel Core-based microprocessors\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u9177\u777f\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\u4ea7\u54c1\uff08CPU\uff09\u3002\r\n\r\nIntel Core-based microprocessors\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u6570\u5bc4\u5b58\u5668\u4e2d\u5b58\u50a8\u7684\u6709\u5173\u5176\u4ed6\u8fdb\u7a0b\u503c\u3002",
"discovererName": "Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH, Zdenek Sojka from SYSGO AG, and Colin Percival",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=58122bf1d856a4ea9581d62a07c557d997d46a19",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-13392",
"openTime": "2018-07-18",
"patchDescription": "Intel Core-based microprocessors\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u9177\u777f\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\u4ea7\u54c1\uff08CPU\uff09\u3002\r\n\r\nIntel Core-based microprocessors\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u6570\u5bc4\u5b58\u5668\u4e2d\u5b58\u50a8\u7684\u6709\u5173\u5176\u4ed6\u8fdb\u7a0b\u503c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Intel Core Microprocessors\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Intel Core Microprocessors 0"
},
"referenceLink": "https://securitytracker.com/id/1041124",
"serverity": "\u4e2d",
"submitTime": "2018-06-15",
"title": "Intel Core Microprocessors\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.