Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0001 (GCVE-0-2022-0001)
Vulnerability from cvelistv5 – Published: 2022-03-11 00:00 – Updated: 2025-05-05 16:44- information disclosure
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Processors |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-04-01T16:11:32.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-0001-detect-specter-vulnerability?prevUrl=wizard"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-0001-mitigate-specter-vulnerability?prevUrl=wizard"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"name": "VU#155143",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/155143"
}
],
"title": "CVE Program Container",
"x_generator": {
"engine": "ADPogram 0.0.1"
}
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-0001",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:21:07.709784Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-05T16:44:34.239Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Processors",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": " information disclosure ",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-09T15:05:59.454Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"name": "VU#155143",
"tags": [
"third-party-advisory"
],
"url": "https://www.kb.cert.org/vuls/id/155143"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-0001",
"datePublished": "2022-03-11T00:00:00.000Z",
"dateReserved": "2021-10-15T00:00:00.000Z",
"dateUpdated": "2025-05-05T16:44:34.239Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2022-0001-detect-specter-vulnerability?prevUrl=wizard\"}, {\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2022-0001-mitigate-specter-vulnerability?prevUrl=wizard\"}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/18/2\", \"name\": \"[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220818-0004/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/155143\", \"name\": \"VU#155143\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-04-01T16:11:32.250Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-0001\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:21:07.709784Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:13:11.506Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) Processors\", \"versions\": [{\"status\": \"affected\", \"version\": \"See references\"}]}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/18/2\", \"name\": \"[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220818-0004/\"}, {\"url\": \"https://www.kb.cert.org/vuls/id/155143\", \"name\": \"VU#155143\", \"tags\": [\"third-party-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \" information disclosure \"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2024-04-09T15:05:59.454Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-0001\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-05T16:44:34.239Z\", \"dateReserved\": \"2021-10-15T00:00:00.000Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2022-03-11T00:00:00.000Z\", \"assignerShortName\": \"intel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0220
Vulnerability from certfr_avis - Published: 2023-03-14 - Updated: 2023-03-14
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC NMS | ||
| Siemens | N/A | De nombreuses références SCALANCE et SIPROTEC (se référer aux bulletins de sécurité de l'éditeur pour les versions affectées) | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW versions antérieures à V5.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | Mendix SAML (Mendix 7 compatible) versions antérieures à V1.17.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 8 compatible) versions antérieures à V2.3.0 | ||
| Siemens | N/A | SINEMA Server V14 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINEC NMS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "De nombreuses r\u00e9f\u00e9rences SCALANCE et SIPROTEC (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM CROSSBOW versions ant\u00e9rieures \u00e0 V5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V1.17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2023-25957",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25957"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2022-38767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38767"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2023-27462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27462"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2023-27309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27309"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32981"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2023-27310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27310"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2023-27463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27463"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-20158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20158"
}
],
"initial_release_date": "2023-03-14T00:00:00",
"last_revision_date": "2023-03-14T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0220",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419740 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-419740.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-320629 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-320629.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-203374 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-203374.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-851884 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-851884.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-565386 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-565386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-260625 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-260625.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-726834 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-726834.html"
}
]
}
CERTFR-2022-AVI-222
Vulnerability from certfr_avis - Published: 2022-03-09 - Updated: 2022-03-09
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Famille de processeurs Intel Xeon W-1300 | ||
| Intel | N/A | Processeurs Intel Celeron Séries N | ||
| Intel | N/A | Famille de processeurs Intel Xeon W | ||
| Intel | N/A | Séries de processeurs Intel Pentium Gold (44XX et 65XX) | ||
| Intel | N/A | Séries de processeurs Intel Pentium Gold | ||
| Intel | N/A | Séries de processeurs Intel Atom C3000 | ||
| Intel | N/A | Famille de processeurs Intel Xeon D | ||
| Intel | N/A | Séries de chipsets Intel 300 | ||
| Intel | N/A | Séries de chipsets Intel C240 | ||
| Intel | N/A | Séries de processeurs Intel Celeron J4000/N4000 | ||
| Intel | N/A | Processeurs Intel Celeron séries J | ||
| Intel | N/A | Famille de processeurs Intel Celeron | ||
| Intel | N/A | Famille de processeurs Intel Core | ||
| Intel | N/A | Famille de processeurs Intel Xeon Scalable 2nde génération | ||
| Intel | N/A | Famille de processeurs Intel Core 8ème génération | ||
| Intel | N/A | Séries de chipsets Intel 200 | ||
| Intel | N/A | Famille de processeurs Intel Core 9ème génération | ||
| Intel | N/A | Famille de processeurs Intel Core 10ème génération | ||
| Intel | N/A | Famille de processeurs Intel Core 12ème génération | ||
| Intel | N/A | Processeurs Intel Atom C3000 Automated Driving series | ||
| Intel | N/A | Séries de processeurs Intel Celeron 4000 (42XX et 43XX) | ||
| Intel | N/A | Séries de processeurs Intel Pentium J5000/N5000 | ||
| Intel | N/A | Famille de processeurs Intel Core 6ème génération | ||
| Intel | N/A | Séries de chipsets Intel C230 | ||
| Intel | N/A | Séries de chipsets Intel C620 | ||
| Intel | N/A | Séries de processeurs Intel Xeon D 2000 | ||
| Intel | N/A | Famille de processeurs Intel Core 7ème génération | ||
| Intel | N/A | Séries de processeurs Intel Pentium Gold (54XX) | ||
| Intel | N/A | Séries de processeurs Intel Celeron 3000 (38XX et 39XX) | ||
| Intel | N/A | Séries de processeurs Intel Pentium 4000 (44XX) | ||
| Intel | N/A | Séries de processeurs Intel Atom X E3900 | ||
| Intel | N/A | Famille de processeurs Intel Core X | ||
| Intel | N/A | Séries de processeurs Intel X299 | ||
| Intel | N/A | Processeurs Intel Core avec technologie Intel Hybrid | ||
| Intel | N/A | Séries A Intel Atom | ||
| Intel | N/A | Processeurs Intel Atom | ||
| Intel | N/A | Séries de processeurs Intel Celeron J3000/N3000 | ||
| Intel | N/A | Famille de processeurs Intel Xeon Scalable 3ème génération | ||
| Intel | N/A | Famille de processeurs Intel Core 11ème génération | ||
| Intel | N/A | Famille de processeurs Intel Xeon E-2300 | ||
| Intel | N/A | Séries de processeurs Intel Celeron 5000 | ||
| Intel | N/A | Séries de chipsets Intel C420 | ||
| Intel | N/A | Famille de processeurs Intel Xeon | ||
| Intel | N/A | Famille de processeurs Intel Xeon E 9ème génération | ||
| Intel | N/A | Séries de chipsets Intel 100 | ||
| Intel | N/A | Processeurs Intel Pentium séries Silver |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Famille de processeurs Intel Xeon W-1300",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Celeron S\u00e9ries N",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon W",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium Gold (44XX et 65XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium Gold",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Atom C3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon D",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel 300",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C240",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron J4000/N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Celeron s\u00e9ries J",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Celeron",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon Scalable 2nde g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel 200",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 9\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 10\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 12\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Atom C3000 Automated Driving series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron 4000 (42XX et 43XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium J5000/N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 6\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C230",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C620",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Xeon D 2000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium Gold (54XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron 3000 (38XX et 39XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium 4000 (44XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Atom X E3900",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core X",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel X299",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core avec technologie Intel Hybrid",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries A Intel Atom",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Atom",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron J3000/N3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon Scalable 3\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 11\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon E-2300",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron 5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C420",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon E 9\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel 100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Pentium s\u00e9ries Silver",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33150"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
}
],
"initial_release_date": "2022-03-09T00:00:00",
"last_revision_date": "2022-03-09T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-222",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel sa-00609 du 08 mars 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel sa-00598 du 08 mars 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
}
]
}
CERTFR-2022-AVI-264
Vulnerability from certfr_avis - Published: 2022-03-23 - Updated: 2022-03-23
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian 9 stretch LTS versions ant\u00e9rieures \u00e0 4.19.232-1~deb9u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian 9 stretch versions ant\u00e9rieures \u00e0 4.9.303-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2021-29264",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29264"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2021-4202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4202"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38300"
},
{
"name": "CVE-2022-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0644"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2021-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39714"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2022-25258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25258"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-29374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29374"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-22600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22600"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-25375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25375"
},
{
"name": "CVE-2021-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39686"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2022-24959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24959"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-264",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Debian dla-2940 du 09 mars 2022",
"url": "https://www.debian.org/lts/security/2022/dla-2940"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Debian dla-2941 du 09 mars 2022",
"url": "https://www.debian.org/lts/security/2022/dla-2941"
}
]
}
CERTFR-2022-AVI-353
Vulnerability from certfr_avis - Published: 2022-04-19 - Updated: 2022-04-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2022-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26966"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2022-0812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0812"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2021-45868",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45868"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-1055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1055"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2022-28389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28389"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
}
],
"initial_release_date": "2022-04-19T00:00:00",
"last_revision_date": "2022-04-19T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-353",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221194-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221194-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221230-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221230-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221248-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221248-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221224-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221224-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221212-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221212-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221197-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221197-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221223-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221223-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221242-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221242-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221196-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221196-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221193-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221193-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221246-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221246-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE su-20221215-1 du 15 avril 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221215-1/"
}
]
}
CERTFR-2022-AVI-299
Vulnerability from certfr_avis - Published: 2022-04-01 - Updated: 2022-04-01
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-42327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42327"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4090"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-0935",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0935"
},
{
"name": "CVE-2022-1055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1055"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-28964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28964"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2021-39636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39636"
},
{
"name": "CVE-2022-0742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0742"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2022-04-01T00:00:00",
"last_revision_date": "2022-04-01T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-299",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5357-2 du 31 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5357-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5361-1 du 01 avril 2022",
"url": "https://ubuntu.com/security/notices/USN-5361-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5362-1 du 01 avril 2022",
"url": "https://ubuntu.com/security/notices/USN-5362-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5358-2 du 31 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5358-2"
}
]
}
CERTFR-2022-AVI-230
Vulnerability from certfr_avis - Published: 2022-03-10 - Updated: 2022-03-10
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
}
],
"initial_release_date": "2022-03-10T00:00:00",
"last_revision_date": "2022-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-230",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5319-1 du 09 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5319-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5317-1 du 09 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5317-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5318-1 du 09 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5318-1"
}
]
}
CERTFR-2022-AVI-221
Vulnerability from certfr_avis - Published: 2022-03-09 - Updated: 2022-03-09
De multiples vulnérabilités ont été découvertes dans Xen. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Contournement provisoire
L'éditeur propose des mesures de contournement pour les systèmes AMD. Se référer au bulletin de sécurité dans la section Documentation.
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| XEN | Xen | Xen versions 4.15.x sans les correctifs de sécurité xsa398-4-15 | ||
| XEN | Xen | Xen version unstable sans les correctifs xsa398 | ||
| XEN | Xen | Xen versions 4.12.x sans les correctifs de sécurité xsa398-4-12 | ||
| XEN | Xen | Xen versions 4.16.x sans les correctifs de sécurité xsa398-4-16 | ||
| XEN | Xen | Xen versions 4.13.x sans les correctifs de sécurité xsa398-4-13 | ||
| XEN | Xen | Xen versions 4.14.x sans les correctifs de sécurité xsa398-4-14 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen versions 4.15.x sans les correctifs de s\u00e9curit\u00e9 xsa398-4-15",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen version unstable sans les correctifs xsa398",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.12.x sans les correctifs de s\u00e9curit\u00e9 xsa398-4-12",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.16.x sans les correctifs de s\u00e9curit\u00e9 xsa398-4-16",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.13.x sans les correctifs de s\u00e9curit\u00e9 xsa398-4-13",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.14.x sans les correctifs de s\u00e9curit\u00e9 xsa398-4-14",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n\nL\u0027\u00e9diteur propose des mesures de contournement pour les syst\u00e8mes AMD. Se\nr\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 dans la section Documentation.\n",
"cves": [
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
}
],
"initial_release_date": "2022-03-09T00:00:00",
"last_revision_date": "2022-03-09T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-221",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Xen. Elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen advisory-398 du 08 mars 2022",
"url": "https://xenbits.xen.org/xsa/advisory-398.html"
}
]
}
CERTFR-2024-AVI-0289
Vulnerability from certfr_avis - Published: 2024-04-10 - Updated: 2024-04-10
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4291 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.830 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4291 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.24821 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27067 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.2402 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Outlook pour Windows versions antérieures à 1.2023.0322.0100 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27067 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.21924 | ||
| Microsoft | Windows | Microsoft ODBC Driver 18 pour SQL Server sur Windows versions antérieures à 18.3.3.1 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 versions antérieures à 10.0.22000.2899 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4291 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.24821 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 versions antérieures à 10.0.22000.2899 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2402 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.4291 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.21924 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4291 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Microsoft ODBC Driver 17 pour SQL Server sur Windows versions antérieures à 17.10.6.1 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20596 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20596 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4291 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3435 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3435 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.5696 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.830",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.24821",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27067",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2402",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Outlook pour Windows versions ant\u00e9rieures \u00e0 1.2023.0322.0100",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27067",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.21924",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur Windows versions ant\u00e9rieures \u00e0 18.3.3.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22000.2899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.24821",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22000.2899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2402",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.21924",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur Windows versions ant\u00e9rieures \u00e0 17.10.6.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20596",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20596",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3435",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3435",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-28902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28902"
},
{
"name": "CVE-2024-26232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26232"
},
{
"name": "CVE-2024-26214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26214"
},
{
"name": "CVE-2024-28919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28919"
},
{
"name": "CVE-2024-26239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26239"
},
{
"name": "CVE-2024-26194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26194"
},
{
"name": "CVE-2024-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26222"
},
{
"name": "CVE-2024-28933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28933"
},
{
"name": "CVE-2024-28941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28941"
},
{
"name": "CVE-2024-28925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28925"
},
{
"name": "CVE-2024-26211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26211"
},
{
"name": "CVE-2024-29066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29066"
},
{
"name": "CVE-2024-20693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20693"
},
{
"name": "CVE-2024-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26242"
},
{
"name": "CVE-2024-20688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20688"
},
{
"name": "CVE-2024-26252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26252"
},
{
"name": "CVE-2024-28896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28896"
},
{
"name": "CVE-2024-26179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26179"
},
{
"name": "CVE-2024-26227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26227"
},
{
"name": "CVE-2024-28905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28905"
},
{
"name": "CVE-2024-20669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20669"
},
{
"name": "CVE-2024-26223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26223"
},
{
"name": "CVE-2024-28932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28932"
},
{
"name": "CVE-2024-26180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26180"
},
{
"name": "CVE-2024-28897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28897"
},
{
"name": "CVE-2024-26234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26234"
},
{
"name": "CVE-2024-21447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21447"
},
{
"name": "CVE-2024-29043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29043"
},
{
"name": "CVE-2024-28935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28935"
},
{
"name": "CVE-2024-28930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28930"
},
{
"name": "CVE-2024-28921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28921"
},
{
"name": "CVE-2024-26253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26253"
},
{
"name": "CVE-2024-28943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28943"
},
{
"name": "CVE-2024-29064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29064"
},
{
"name": "CVE-2024-28901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28901"
},
{
"name": "CVE-2024-26243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26243"
},
{
"name": "CVE-2024-29062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29062"
},
{
"name": "CVE-2024-26195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26195"
},
{
"name": "CVE-2024-26231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26231"
},
{
"name": "CVE-2024-26213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26213"
},
{
"name": "CVE-2024-26219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26219"
},
{
"name": "CVE-2024-26168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26168"
},
{
"name": "CVE-2024-28934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28934"
},
{
"name": "CVE-2024-26175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26175"
},
{
"name": "CVE-2024-26207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26207"
},
{
"name": "CVE-2024-26210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26210"
},
{
"name": "CVE-2024-28936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28936"
},
{
"name": "CVE-2024-26171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26171"
},
{
"name": "CVE-2024-26255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26255"
},
{
"name": "CVE-2024-26189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26189"
},
{
"name": "CVE-2024-28924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28924"
},
{
"name": "CVE-2024-28907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28907"
},
{
"name": "CVE-2024-23594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23594"
},
{
"name": "CVE-2024-26215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26215"
},
{
"name": "CVE-2024-23593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23593"
},
{
"name": "CVE-2024-26202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26202"
},
{
"name": "CVE-2024-28938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28938"
},
{
"name": "CVE-2024-28904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28904"
},
{
"name": "CVE-2024-26230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26230"
},
{
"name": "CVE-2024-26235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26235"
},
{
"name": "CVE-2024-28929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28929"
},
{
"name": "CVE-2024-20670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20670"
},
{
"name": "CVE-2024-28898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28898"
},
{
"name": "CVE-2024-28920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28920"
},
{
"name": "CVE-2024-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26221"
},
{
"name": "CVE-2024-26226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26226"
},
{
"name": "CVE-2024-28931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28931"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2024-29056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29056"
},
{
"name": "CVE-2024-28900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28900"
},
{
"name": "CVE-2024-29052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29052"
},
{
"name": "CVE-2024-29988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29988"
},
{
"name": "CVE-2024-26233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26233"
},
{
"name": "CVE-2024-26229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26229"
},
{
"name": "CVE-2024-26248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26248"
},
{
"name": "CVE-2024-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26158"
},
{
"name": "CVE-2024-26250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26250"
},
{
"name": "CVE-2024-26241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26241"
},
{
"name": "CVE-2024-28923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28923"
},
{
"name": "CVE-2024-26228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26228"
},
{
"name": "CVE-2024-26236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26236"
},
{
"name": "CVE-2024-26245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26245"
},
{
"name": "CVE-2024-28937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28937"
},
{
"name": "CVE-2024-26200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26200"
},
{
"name": "CVE-2024-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26217"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2024-26209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26209"
},
{
"name": "CVE-2024-29061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29061"
},
{
"name": "CVE-2024-28922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28922"
},
{
"name": "CVE-2024-26224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26224"
},
{
"name": "CVE-2024-26218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26218"
},
{
"name": "CVE-2024-26216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26216"
},
{
"name": "CVE-2024-20665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20665"
},
{
"name": "CVE-2024-20678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20678"
},
{
"name": "CVE-2024-26172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26172"
},
{
"name": "CVE-2024-26237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26237"
},
{
"name": "CVE-2024-26208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26208"
},
{
"name": "CVE-2024-26183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26183"
},
{
"name": "CVE-2024-29050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29050"
},
{
"name": "CVE-2024-26240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26240"
},
{
"name": "CVE-2024-20689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20689"
},
{
"name": "CVE-2024-26244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26244"
},
{
"name": "CVE-2024-26212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26212"
},
{
"name": "CVE-2024-28903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28903"
},
{
"name": "CVE-2024-26205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26205"
},
{
"name": "CVE-2024-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26254"
},
{
"name": "CVE-2024-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26220"
}
],
"initial_release_date": "2024-04-10T00:00:00",
"last_revision_date": "2024-04-10T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26232 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26232"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29043 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29043"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28932 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28925 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26210 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26210"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29062 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26236 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26236"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26237 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26237"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26180 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26180"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28922 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28922"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29061 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28931 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21447 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21447"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26253 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26183 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26183"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26255 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26255"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28923 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28923"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26229 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26221 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26221"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-0001 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0001"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26227 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26227"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29988 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26205 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26205"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20689 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28938 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26224 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26224"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26158 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26175 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26175"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26244 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26244"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29050 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29050"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28897 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26220 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26220"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28937 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26240 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26217 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26217"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26242 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26242"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26218 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26218"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28921 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28921"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28907 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28907"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28902 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28902"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28903 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28903"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28920 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28920"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28943 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28943"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26171 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26171"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28941 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28941"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28905 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26213 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26213"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28934 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20665 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26216 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26216"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26231 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26231"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28900 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28900"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26228 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28935 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26215 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26215"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-23593 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23593"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26214 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26214"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26248 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26248"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26254 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26254"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26226 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26226"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28930 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20693 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26208 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29056 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29066 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29066"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28896 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28896"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-23594 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23594"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20678 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20678"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26207 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26207"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28919 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28919"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28904 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26252 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26241 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26241"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29052 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29052"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20669 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26172 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26172"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26194 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20688 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28898 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28898"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26200 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26239 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26239"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26189 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26189"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26219 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26219"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29064 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29064"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26256 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26202 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26202"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26243 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26243"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26195 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26195"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28924 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28936 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28901 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28901"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26233 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26233"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26179 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26222 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26222"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20670 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20670"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28929 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28933 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26250 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26230 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26230"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26168 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26168"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26211 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26211"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26209 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26209"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26234 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26212 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26212"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26223 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26223"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26235 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26235"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26245 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26245"
}
],
"reference": "CERTFR-2024-AVI-0289",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows du 09 avril 2024",
"url": null
}
]
}
CERTFR-2022-AVI-231
Vulnerability from certfr_avis - Published: 2022-03-10 - Updated: 2022-03-10
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian stable (bullseye) versions ant\u00e9rieures \u00e0 5.10.103-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian oldstable (buster) versions ant\u00e9rieures \u00e0 4.19.232-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2021-4202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4202"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38300"
},
{
"name": "CVE-2022-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0644"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2020-36310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36310"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2022-25258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25258"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"name": "CVE-2020-29374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29374"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-22600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22600"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-25375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25375"
},
{
"name": "CVE-2021-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39686"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2022-24959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24959"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-10T00:00:00",
"last_revision_date": "2022-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-231",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5095 du 09 mars 2022",
"url": "https://www.debian.org/security/2022/dsa-5095"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5096 du 09 mars 2022",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}
CERTFR-2022-AVI-229
Vulnerability from certfr_avis - Published: 2022-03-10 - Updated: 2022-03-10
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Realtime Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2016-10905",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10905"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2022-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0644"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"name": "CVE-2022-25258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25258"
},
{
"name": "CVE-2022-24958",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24958"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-25375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25375"
},
{
"name": "CVE-2019-0136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0136"
},
{
"name": "CVE-2022-24959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24959"
}
],
"initial_release_date": "2022-03-10T00:00:00",
"last_revision_date": "2022-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-229",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220766-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220766-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220757-1 du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220757-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220762-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220762-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220761-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220761-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 202214905-1 du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-202214905-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220760-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220760-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220755-1 du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220755-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220767-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220767-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220765-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220765-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220763-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220763-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220768-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220768-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220764-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220764-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220756-1 du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220756-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE 20220759-1/ du 08 mars 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220759-1/"
}
]
}
cve-2022-0001
Vulnerability from osv_almalinux
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
-
kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
-
kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
-
kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)
-
kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
-
kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
-
kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
-
kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
-
kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
-
kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
-
kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
-
kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
-
kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
-
kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
-
kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
-
kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
-
kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
-
kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
-
kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
-
kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
-
kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
-
kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)
-
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
-
kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
-
kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
-
kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
-
kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
-
kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)
-
kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
-
kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
-
kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
-
kernel: information leak in the IPv6 implementation (CVE-2021-45485)
-
kernel: information leak in the IPv4 implementation (CVE-2021-45486)
-
hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
-
hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
-
kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
-
kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
-
kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
-
kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "bpftool"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-abi-stablelists"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-cross-headers"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-debug-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-doc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-headers"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-modules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-modules-extra"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-tools"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-tools-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "kernel-tools-libs-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "perf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-perf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.18.0-372.9.1.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2022:1988",
"modified": "2022-05-10T08:11:35Z",
"published": "2022-05-10T08:11:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1988.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-0404"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-13974"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-27820"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2020-4788"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-0941"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-20322"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-21781"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-26401"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-29154"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3612"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3669"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-37159"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3743"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3744"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3752"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3759"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3764"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3772"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3773"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4002"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4037"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4083"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4157"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-41864"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4197"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4203"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-42739"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-43056"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-43389"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-43976"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-44733"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45485"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45486"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-0001"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-0002"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-0286"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-0322"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-1011"
}
],
"related": [
"CVE-2021-4083",
"CVE-2020-0404",
"CVE-2020-4788",
"CVE-2020-13974",
"CVE-2021-0941",
"CVE-2021-3612",
"CVE-2021-3669",
"CVE-2021-3743",
"CVE-2021-3744",
"CVE-2021-3752",
"CVE-2021-3759",
"CVE-2021-3764",
"CVE-2021-3772",
"CVE-2021-3773",
"CVE-2021-4002",
"CVE-2018-13405",
"CVE-2021-4037",
"CVE-2021-4157",
"CVE-2021-4197",
"CVE-2021-4203",
"CVE-2021-20322",
"CVE-2021-21781",
"CVE-2017-5715",
"CVE-2021-26401",
"CVE-2021-29154",
"CVE-2021-37159",
"CVE-2021-41864",
"CVE-2021-42739",
"CVE-2021-43056",
"CVE-2021-43389",
"CVE-2021-43976",
"CVE-2021-44733",
"CVE-2021-45485",
"CVE-2021-45486",
"CVE-2022-0001",
"CVE-2022-0002",
"CVE-2022-0286",
"CVE-2022-0322",
"CVE-2022-1011",
"CVE-2020-27820"
],
"summary": "Important: kernel security, bug fix, and enhancement update"
}
FKIE_CVE-2022-0001
Vulnerability from fkie_nvd - Published: 2022-03-11 18:15 - Updated: 2025-05-05 17:176.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://www.openwall.com/lists/oss-security/2022/03/18/2 | Mailing List, Third Party Advisory | |
| secure@intel.com | https://security.netapp.com/advisory/ntap-20220818-0004/ | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html | Vendor Advisory | |
| secure@intel.com | https://www.kb.cert.org/vuls/id/155143 | ||
| secure@intel.com | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/03/18/2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220818-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/155143 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vicarius.io/vsociety/posts/cve-2022-0001-detect-specter-vulnerability?prevUrl=wizard | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vicarius.io/vsociety/posts/cve-2022-0001-mitigate-specter-vulnerability?prevUrl=wizard |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | atom_p5921b | - | |
| intel | atom_p5931b | - | |
| intel | atom_p5942b | - | |
| intel | atom_p5962b | - | |
| intel | atom_x6200fe | - | |
| intel | atom_x6211e | - | |
| intel | atom_x6212re | - | |
| intel | atom_x6413e | - | |
| intel | atom_x6425e | - | |
| intel | atom_x6425re | - | |
| intel | atom_x6427fe | - | |
| intel | celeron_5305u | - | |
| intel | celeron_6305 | - | |
| intel | celeron_6305e | - | |
| intel | celeron_6600he | - | |
| intel | celeron_g5205u | - | |
| intel | celeron_g5305u | - | |
| intel | celeron_g5900 | - | |
| intel | celeron_g5900t | - | |
| intel | celeron_g5905 | - | |
| intel | celeron_g5905t | - | |
| intel | celeron_g5920 | - | |
| intel | celeron_g5925 | - | |
| intel | celeron_g6900 | - | |
| intel | celeron_g6900t | - | |
| intel | celeron_j4005 | - | |
| intel | celeron_j4025 | - | |
| intel | celeron_j4105 | - | |
| intel | celeron_j4125 | - | |
| intel | celeron_j6413 | - | |
| intel | celeron_n4000 | - | |
| intel | celeron_n4020 | - | |
| intel | celeron_n4100 | - | |
| intel | celeron_n4120 | - | |
| intel | celeron_n4500 | - | |
| intel | celeron_n4504 | - | |
| intel | celeron_n5100 | - | |
| intel | celeron_n5105 | - | |
| intel | celeron_n6211 | - | |
| intel | core_i3-1000g1 | - | |
| intel | core_i3-1000g4 | - | |
| intel | core_i3-1005g1 | - | |
| intel | core_i3-10100 | - | |
| intel | core_i3-10100f | - | |
| intel | core_i3-10100t | - | |
| intel | core_i3-10100te | - | |
| intel | core_i3-10105 | - | |
| intel | core_i3-10105f | - | |
| intel | core_i3-10105t | - | |
| intel | core_i3-10110u | - | |
| intel | core_i3-10300 | - | |
| intel | core_i3-10300t | - | |
| intel | core_i3-10305 | - | |
| intel | core_i3-10305t | - | |
| intel | core_i3-10320 | - | |
| intel | core_i3-10325 | - | |
| intel | core_i3-11100he | - | |
| intel | core_i3-1110g4 | - | |
| intel | core_i3-1115g4 | - | |
| intel | core_i3-1115g4e | - | |
| intel | core_i3-1115gre | - | |
| intel | core_i3-1120g4 | - | |
| intel | core_i3-1125g4 | - | |
| intel | core_i3-12100 | - | |
| intel | core_i3-12100f | - | |
| intel | core_i3-12100t | - | |
| intel | core_i3-1220p | - | |
| intel | core_i3-12300 | - | |
| intel | core_i3-12300t | - | |
| intel | core_i3-l13g4 | - | |
| intel | core_i5-10110y | - | |
| intel | core_i5-10200h | - | |
| intel | core_i5-10210u | - | |
| intel | core_i5-10210y | - | |
| intel | core_i5-10300h | - | |
| intel | core_i5-1030g4 | - | |
| intel | core_i5-1030g7 | - | |
| intel | core_i5-10310y | - | |
| intel | core_i5-1035g1 | - | |
| intel | core_i5-1035g4 | - | |
| intel | core_i5-1035g7 | - | |
| intel | core_i5-10400 | - | |
| intel | core_i5-10400f | - | |
| intel | core_i5-10400h | - | |
| intel | core_i5-10400t | - | |
| intel | core_i5-10500 | - | |
| intel | core_i5-10500t | - | |
| intel | core_i5-10500te | - | |
| intel | core_i5-10505 | - | |
| intel | core_i5-10600 | - | |
| intel | core_i5-10600k | - | |
| intel | core_i5-10600kf | - | |
| intel | core_i5-10600t | - | |
| intel | core_i5-11260h | - | |
| intel | core_i5-11300h | - | |
| intel | core_i5-1130g7 | - | |
| intel | core_i5-11320h | - | |
| intel | core_i5-1135g7 | - | |
| intel | core_i5-11400 | - | |
| intel | core_i5-11400f | - | |
| intel | core_i5-11400h | - | |
| intel | core_i5-11400t | - | |
| intel | core_i5-1140g7 | - | |
| intel | core_i5-1145g7 | - | |
| intel | core_i5-1145g7e | - | |
| intel | core_i5-1145gre | - | |
| intel | core_i5-11500 | - | |
| intel | core_i5-11500h | - | |
| intel | core_i5-11500t | - | |
| intel | core_i5-1155g7 | - | |
| intel | core_i5-11600 | - | |
| intel | core_i5-11600k | - | |
| intel | core_i5-11600kf | - | |
| intel | core_i5-11600t | - | |
| intel | core_i5-12400 | - | |
| intel | core_i5-12400f | - | |
| intel | core_i5-12400t | - | |
| intel | core_i5-1240p | - | |
| intel | core_i5-12450h | - | |
| intel | core_i5-12500 | - | |
| intel | core_i5-12500h | - | |
| intel | core_i5-12500t | - | |
| intel | core_i5-1250p | - | |
| intel | core_i5-12600 | - | |
| intel | core_i5-12600h | - | |
| intel | core_i5-12600k | - | |
| intel | core_i5-12600kf | - | |
| intel | core_i5-12600t | - | |
| intel | core_i5-8200y | - | |
| intel | core_i5-8210y | - | |
| intel | core_i5-8265u | - | |
| intel | core_i5-8310y | - | |
| intel | core_i5-8365u | - | |
| intel | core_i5-9300h | - | |
| intel | core_i5-9400 | - | |
| intel | core_i5-9400f | - | |
| intel | core_i5-9400h | - | |
| intel | core_i5-9600k | - | |
| intel | core_i5-9600kf | - | |
| intel | core_i5-l16g7 | - | |
| intel | core_i7-10510u | - | |
| intel | core_i7-10510y | - | |
| intel | core_i7-1060g7 | - | |
| intel | core_i7-10610u | - | |
| intel | core_i7-1065g7 | - | |
| intel | core_i7-10700 | - | |
| intel | core_i7-10700e | - | |
| intel | core_i7-10700f | - | |
| intel | core_i7-10700k | - | |
| intel | core_i7-10700kf | - | |
| intel | core_i7-10700t | - | |
| intel | core_i7-10700te | - | |
| intel | core_i7-10710u | - | |
| intel | core_i7-10750h | - | |
| intel | core_i7-10810u | - | |
| intel | core_i7-10850h | - | |
| intel | core_i7-10870h | - | |
| intel | core_i7-10875h | - | |
| intel | core_i7-11370h | - | |
| intel | core_i7-11375h | - | |
| intel | core_i7-11390h | - | |
| intel | core_i7-1160g7 | - | |
| intel | core_i7-1165g7 | - | |
| intel | core_i7-11700 | - | |
| intel | core_i7-11700f | - | |
| intel | core_i7-11700k | - | |
| intel | core_i7-11700kf | - | |
| intel | core_i7-11700t | - | |
| intel | core_i7-11800h | - | |
| intel | core_i7-1180g7 | - | |
| intel | core_i7-11850h | - | |
| intel | core_i7-11850he | - | |
| intel | core_i7-1185g7 | - | |
| intel | core_i7-1185g7e | - | |
| intel | core_i7-1185gre | - | |
| intel | core_i7-1195g7 | - | |
| intel | core_i7-1260p | - | |
| intel | core_i7-12650h | - | |
| intel | core_i7-12700 | - | |
| intel | core_i7-12700f | - | |
| intel | core_i7-12700h | - | |
| intel | core_i7-12700k | - | |
| intel | core_i7-12700kf | - | |
| intel | core_i7-12700t | - | |
| intel | core_i7-1270p | - | |
| intel | core_i7-12800h | - | |
| intel | core_i7-1280p | - | |
| intel | core_i7-7640x | - | |
| intel | core_i7-7740x | - | |
| intel | core_i7-7800x | - | |
| intel | core_i7-7820x | - | |
| intel | core_i7-8500y | - | |
| intel | core_i7-8565u | - | |
| intel | core_i7-8665u | - | |
| intel | core_i7-9700k | - | |
| intel | core_i7-9700kf | - | |
| intel | core_i7-9750hf | - | |
| intel | core_i7-9850h | - | |
| intel | core_i9-10850h | - | |
| intel | core_i9-10850k | - | |
| intel | core_i9-10885h | - | |
| intel | core_i9-10900 | - | |
| intel | core_i9-10900e | - | |
| intel | core_i9-10900f | - | |
| intel | core_i9-10900k | - | |
| intel | core_i9-10900kf | - | |
| intel | core_i9-10900t | - | |
| intel | core_i9-10900te | - | |
| intel | core_i9-10900x | - | |
| intel | core_i9-10920x | - | |
| intel | core_i9-10940x | - | |
| intel | core_i9-10980hk | - | |
| intel | core_i9-11900 | - | |
| intel | core_i9-11900f | - | |
| intel | core_i9-11900h | - | |
| intel | core_i9-11900k | - | |
| intel | core_i9-11900kf | - | |
| intel | core_i9-11900t | - | |
| intel | core_i9-11950h | - | |
| intel | core_i9-11980hk | - | |
| intel | core_i9-12900 | - | |
| intel | core_i9-12900f | - | |
| intel | core_i9-12900h | - | |
| intel | core_i9-12900hk | - | |
| intel | core_i9-12900k | - | |
| intel | core_i9-12900kf | - | |
| intel | core_i9-12900t | - | |
| intel | core_i9-7900x | - | |
| intel | core_i9-7920x | - | |
| intel | core_i9-7940x | - | |
| intel | core_i9-7960x | - | |
| intel | core_i9-9800x | - | |
| intel | core_i9-9820x | - | |
| intel | core_i9-9880h | - | |
| intel | core_i9-9900k | - | |
| intel | core_i9-9900kf | - | |
| intel | core_i9-9900x | - | |
| intel | core_i9-9920x | - | |
| intel | core_i9-9940x | - | |
| intel | core_i9-9960x | - | |
| intel | core_i9-9980hk | - | |
| intel | core_m3-8100y | - | |
| intel | pentium_gold_7505 | - | |
| intel | pentium_gold_g6400 | - | |
| intel | pentium_gold_g6400t | - | |
| intel | pentium_gold_g6405 | - | |
| intel | pentium_gold_g6405t | - | |
| intel | pentium_gold_g6405u | - | |
| intel | pentium_gold_g6500 | - | |
| intel | pentium_gold_g6500t | - | |
| intel | pentium_gold_g6505 | - | |
| intel | pentium_gold_g6505t | - | |
| intel | pentium_gold_g6600 | - | |
| intel | pentium_gold_g6605 | - | |
| intel | pentium_gold_g7400 | - | |
| intel | pentium_gold_g7400t | - | |
| intel | pentium_j6425 | - | |
| intel | pentium_n6415 | - | |
| intel | pentium_silver_j5005 | - | |
| intel | pentium_silver_j5040 | - | |
| intel | pentium_silver_n5000 | - | |
| intel | pentium_silver_n5030 | - | |
| intel | pentium_silver_n6000 | - | |
| intel | pentium_silver_n6005 | - | |
| intel | xeon_bronze_3204 | - | |
| intel | xeon_bronze_3206r | - | |
| intel | xeon_d1700 | - | |
| intel | xeon_d2700 | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2278ge | - | |
| intel | xeon_e-2278gel | - | |
| intel | xeon_e-2286m | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2314 | - | |
| intel | xeon_e-2324g | - | |
| intel | xeon_e-2334 | - | |
| intel | xeon_e-2336 | - | |
| intel | xeon_e-2356g | - | |
| intel | xeon_e-2374g | - | |
| intel | xeon_e-2378 | - | |
| intel | xeon_e-2378g | - | |
| intel | xeon_e-2386g | - | |
| intel | xeon_e-2388g | - | |
| intel | xeon_gold_5215 | - | |
| intel | xeon_gold_5215l | - | |
| intel | xeon_gold_5217 | - | |
| intel | xeon_gold_5218 | - | |
| intel | xeon_gold_5218b | - | |
| intel | xeon_gold_5218n | - | |
| intel | xeon_gold_5218r | - | |
| intel | xeon_gold_5218t | - | |
| intel | xeon_gold_5220 | - | |
| intel | xeon_gold_5220r | - | |
| intel | xeon_gold_5220s | - | |
| intel | xeon_gold_5220t | - | |
| intel | xeon_gold_5222 | - | |
| intel | xeon_gold_5315y | - | |
| intel | xeon_gold_5317 | - | |
| intel | xeon_gold_5318h | - | |
| intel | xeon_gold_5318n | - | |
| intel | xeon_gold_5318s | - | |
| intel | xeon_gold_5318y | - | |
| intel | xeon_gold_5320 | - | |
| intel | xeon_gold_5320h | - | |
| intel | xeon_gold_5320t | - | |
| intel | xeon_gold_6208u | - | |
| intel | xeon_gold_6209u | - | |
| intel | xeon_gold_6210u | - | |
| intel | xeon_gold_6212u | - | |
| intel | xeon_gold_6222v | - | |
| intel | xeon_gold_6226 | - | |
| intel | xeon_gold_6226r | - | |
| intel | xeon_gold_6230 | - | |
| intel | xeon_gold_6230n | - | |
| intel | xeon_gold_6230r | - | |
| intel | xeon_gold_6230t | - | |
| intel | xeon_gold_6234 | - | |
| intel | xeon_gold_6238 | - | |
| intel | xeon_gold_6238l | - | |
| intel | xeon_gold_6238r | - | |
| intel | xeon_gold_6238t | - | |
| intel | xeon_gold_6240 | - | |
| intel | xeon_gold_6240l | - | |
| intel | xeon_gold_6240r | - | |
| intel | xeon_gold_6240y | - | |
| intel | xeon_gold_6242 | - | |
| intel | xeon_gold_6242r | - | |
| intel | xeon_gold_6244 | - | |
| intel | xeon_gold_6246 | - | |
| intel | xeon_gold_6246r | - | |
| intel | xeon_gold_6248 | - | |
| intel | xeon_gold_6248r | - | |
| intel | xeon_gold_6250 | - | |
| intel | xeon_gold_6250l | - | |
| intel | xeon_gold_6252 | - | |
| intel | xeon_gold_6252n | - | |
| intel | xeon_gold_6254 | - | |
| intel | xeon_gold_6256 | - | |
| intel | xeon_gold_6258r | - | |
| intel | xeon_gold_6262v | - | |
| intel | xeon_gold_6312u | - | |
| intel | xeon_gold_6314u | - | |
| intel | xeon_gold_6326 | - | |
| intel | xeon_gold_6328h | - | |
| intel | xeon_gold_6328hl | - | |
| intel | xeon_gold_6330 | - | |
| intel | xeon_gold_6330h | - | |
| intel | xeon_gold_6330n | - | |
| intel | xeon_gold_6334 | - | |
| intel | xeon_gold_6336y | - | |
| intel | xeon_gold_6338 | - | |
| intel | xeon_gold_6338n | - | |
| intel | xeon_gold_6338t | - | |
| intel | xeon_gold_6342 | - | |
| intel | xeon_gold_6346 | - | |
| intel | xeon_gold_6348 | - | |
| intel | xeon_gold_6348h | - | |
| intel | xeon_gold_6354 | - | |
| intel | xeon_platinum_8253 | - | |
| intel | xeon_platinum_8256 | - | |
| intel | xeon_platinum_8260 | - | |
| intel | xeon_platinum_8260l | - | |
| intel | xeon_platinum_8260y | - | |
| intel | xeon_platinum_8268 | - | |
| intel | xeon_platinum_8270 | - | |
| intel | xeon_platinum_8276 | - | |
| intel | xeon_platinum_8276l | - | |
| intel | xeon_platinum_8280 | - | |
| intel | xeon_platinum_8280l | - | |
| intel | xeon_platinum_8351n | - | |
| intel | xeon_platinum_8352m | - | |
| intel | xeon_platinum_8352s | - | |
| intel | xeon_platinum_8352v | - | |
| intel | xeon_platinum_8352y | - | |
| intel | xeon_platinum_8353h | - | |
| intel | xeon_platinum_8354h | - | |
| intel | xeon_platinum_8356h | - | |
| intel | xeon_platinum_8358 | - | |
| intel | xeon_platinum_8358p | - | |
| intel | xeon_platinum_8360h | - | |
| intel | xeon_platinum_8360hl | - | |
| intel | xeon_platinum_8360y | - | |
| intel | xeon_platinum_8362 | - | |
| intel | xeon_platinum_8368 | - | |
| intel | xeon_platinum_8368q | - | |
| intel | xeon_platinum_8376h | - | |
| intel | xeon_platinum_8376hl | - | |
| intel | xeon_platinum_8380 | - | |
| intel | xeon_platinum_8380h | - | |
| intel | xeon_platinum_8380hl | - | |
| intel | xeon_platinum_9221 | - | |
| intel | xeon_platinum_9222 | - | |
| intel | xeon_platinum_9242 | - | |
| intel | xeon_platinum_9282 | - | |
| intel | xeon_silver_4208 | - | |
| intel | xeon_silver_4209t | - | |
| intel | xeon_silver_4210 | - | |
| intel | xeon_silver_4210r | - | |
| intel | xeon_silver_4210t | - | |
| intel | xeon_silver_4214 | - | |
| intel | xeon_silver_4214r | - | |
| intel | xeon_silver_4214y | - | |
| intel | xeon_silver_4215 | - | |
| intel | xeon_silver_4215r | - | |
| intel | xeon_silver_4216 | - | |
| intel | xeon_silver_4309y | - | |
| intel | xeon_silver_4310 | - | |
| intel | xeon_silver_4310t | - | |
| intel | xeon_silver_4314 | - | |
| intel | xeon_silver_4316 | - | |
| intel | xeon_w-10855 | - | |
| intel | xeon_w-10855m | - | |
| intel | xeon_w-10885m | - | |
| intel | xeon_w-11155mle | - | |
| intel | xeon_w-11155mre | - | |
| intel | xeon_w-11555mle | - | |
| intel | xeon_w-11555mre | - | |
| intel | xeon_w-11855m | - | |
| intel | xeon_w-11865mld | - | |
| intel | xeon_w-11865mre | - | |
| intel | xeon_w-11955m | - | |
| intel | xeon_w-1250 | - | |
| intel | xeon_w-1250p | - | |
| intel | xeon_w-1270 | - | |
| intel | xeon_w-1270p | - | |
| intel | xeon_w-1290 | - | |
| intel | xeon_w-1290e | - | |
| intel | xeon_w-1290p | - | |
| intel | xeon_w-1290t | - | |
| intel | xeon_w-1290te | - | |
| intel | xeon_w-1300 | - | |
| intel | xeon_w-1350 | - | |
| intel | xeon_w-1350p | - | |
| intel | xeon_w-1370 | - | |
| intel | xeon_w-1370p | - | |
| intel | xeon_w-1390 | - | |
| intel | xeon_w-1390p | - | |
| intel | xeon_w-1390t | - | |
| intel | xeon_w-2223 | - | |
| intel | xeon_w-2225 | - | |
| intel | xeon_w-2235 | - | |
| intel | xeon_w-2245 | - | |
| intel | xeon_w-2255 | - | |
| intel | xeon_w-2265 | - | |
| intel | xeon_w-2275 | - | |
| intel | xeon_w-2295 | - | |
| intel | xeon_w-3223 | - | |
| intel | xeon_w-3225 | - | |
| intel | xeon_w-3235 | - | |
| intel | xeon_w-3245 | - | |
| intel | xeon_w-3245m | - | |
| intel | xeon_w-3265 | - | |
| intel | xeon_w-3265m | - | |
| intel | xeon_w-3275 | - | |
| intel | xeon_w-3275m | - | |
| oracle | communications_cloud_native_core_binding_support_function | 22.1.3 | |
| oracle | communications_cloud_native_core_network_exposure_function | 22.1.1 | |
| oracle | communications_cloud_native_core_policy | 22.2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D6CEE1-25DF-43C5-AEBB-49585B64236A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31E2104F-0CE3-4B9D-88B3-35D982C36562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D860FEC-BA79-4FEE-A79C-88AA857358E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CEF8A6-2445-4B63-822D-81F6AC708D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D63F16DE-E30E-4268-B079-E07FD28355BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936DAD12-11D6-4AAF-B48D-5076C94BF30C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F11BB81D-8243-4B19-835C-6E0B4341894A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFB5A51-399C-4AC5-BA09-E74C5AD520EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D5DAA-8279-4A4F-A843-EBA0814952BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABAF1125-B4F7-4BC9-B9DA-CA9125D4BC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA8490E-45D6-4B6E-AF98-B75385574D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06499DE1-DA07-4C39-BBAC-FC57F4E0D4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A87E241-4E74-4F89-8E5A-1A3980A5DDDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4325860-834E-4042-BDB2-5EB5A2D0F1F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0765F36F-94F8-45BE-8AF9-3373E5E567F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC0F50A0-5F1D-4D30-B5F3-C94C44C323D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A8AC04-8182-4BF2-9FDA-B2D607222EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082596F0-6707-4175-A9CB-868D853F7362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74A47464-BB99-44BB-A1B7-D8469BEAF408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12882E19-1107-48E7-9ECD-A2891B8900D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896688AD-84FF-4270-8F44-61764C0052B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1646C42-B42B-451F-9B9D-AEE7CF74E9C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9729F36E-F830-4397-8B0E-A91BF5601F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFEC0A8-69C2-4BE9-B510-5C111C6EE9BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "047CB3C6-C53C-4BA5-AB1C-5D739B30F9FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BF3506-7257-4E37-98AC-DDF0283C1FA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E0B274-5CFA-481E-8355-64D7BC16D871",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC5B69A-022B-4F8C-BAAC-97AFBAEA9730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63684C47-972B-45A3-9234-111F25FD35B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28CE6C6D-7D12-4E4F-BB76-54BF1C0A7B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4AFFB3-6117-4BCC-BE63-814042823182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F880C0CA-815A-49D2-8BA6-F220E3E467D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "989B6E1C-7681-4A11-B9F4-D94C47D57BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F75A1B08-CE1F-47A5-B706-104A62861932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E458521-2BD9-4719-9F83-6ECC3BC19B70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8762D1-5333-4EED-B31E-338052061237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67DCFA7E-734D-4FE0-913E-74D85564ABE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF502AE-BD3F-461B-9476-FB04818DA1F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "445022AC-A3CD-402E-AF44-2C1BC2B790E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF63765B-1BAE-4B53-9BA8-FDFDD2C58417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78245E2-BE22-4BD5-9252-44FF5815D7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1DF00E-1B1A-4FCA-BEEF-7D2BF9F001A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A093D4-A800-4F28-8480-85D62068CB35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F946429E-3362-41E5-88D9-FA01BE8D4312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48C9306-80AD-40CC-9516-E1B6F5A63556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6A5B34-780D-46F2-8DC8-F310F9201FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D78411-A542-48D7-B840-22290B3A98A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AABCC6-4CA4-4A2D-9DC6-D0AD6FF99BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58A1375C-4B33-4557-9BA0-D03EAC350D86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "783F6EC3-354C-4501-9557-E1BFFC0852DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8F48DC-E327-4B3D-BA52-901D21A6412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82004D25-6F97-4549-B98E-148E44134529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B32C5EE-D845-471C-85EA-DA5F9B04F01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E78C7A9B-7DCE-416F-909E-B3CC52AEBE9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "998DCE68-F426-47C5-80F7-BFE42FD69DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE04ADB-3037-41E8-8DF4-8588FDFB759A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D97C7A90-D8C6-4901-BCA1-E40DA173AA9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D94D7B29-565F-4E62-A958-27FFDDD7399E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "594DDCAB-96D4-4999-824E-7597B971B6DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8EA870-2228-4E81-A417-30E040A5C0E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "656D31B6-1E8D-4A44-9D7A-023051E7050A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49EEE5AA-3867-4137-B165-5004C34C77B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A38417-1DB2-4C85-80D9-D3968BF7A83B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74F99F83-A7E6-4AFD-BC42-7348EF6613AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A62A9F4-2B98-4F2D-9143-08D1689E38AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FD06CB-F456-44BD-900B-06131DC68B6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9044310E-4DF9-47BA-9D05-C1405DC8CDB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA881CDA-1C16-43F1-A7D5-69502512A21C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A473FF-F3AD-41F5-B63A-3D6DDB0BD216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2ED18E-241E-4154-9793-FB0E60F9C00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3A7AD3-D7D4-40A5-B1B6-A818B5ACE6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6EDB6772-7FDB-45FF-8D72-952902A7EE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9955F62A-75D3-4347-9AD3-5947FC365838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D77C7-A2F4-4700-AB5A-3EC853496ECA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "La compartici\u00f3n no transparente de selectores de predicci\u00f3n de rama entre contextos en algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio del acceso local"
}
],
"id": "CVE-2022-0001",
"lastModified": "2025-05-05T17:17:29.393",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-03-11T18:15:25.143",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"source": "secure@intel.com",
"url": "https://www.kb.cert.org/vuls/id/155143"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/155143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-0001-detect-specter-vulnerability?prevUrl=wizard"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-0001-mitigate-specter-vulnerability?prevUrl=wizard"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2022-0001
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-0001",
"description": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"id": "GSD-2022-0001",
"references": [
"https://www.suse.com/security/cve/CVE-2022-0001.html",
"https://www.debian.org/security/2022/dsa-5095",
"https://www.debian.org/security/2022/dsa-5096",
"https://ubuntu.com/security/CVE-2022-0001",
"https://advisories.mageia.org/CVE-2022-0001.html",
"https://security.archlinux.org/CVE-2022-0001",
"https://alas.aws.amazon.com/cve/html/CVE-2022-0001.html",
"https://linux.oracle.com/cve/CVE-2022-0001.html",
"https://access.redhat.com/errata/RHSA-2022:1975",
"https://access.redhat.com/errata/RHSA-2022:1988"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-0001"
],
"details": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"id": "GSD-2022-0001",
"modified": "2023-12-13T01:19:11.824708Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-0001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Processors",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " information disclosure "
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220818-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"name": "VU#155143",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/155143"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D6CEE1-25DF-43C5-AEBB-49585B64236A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31E2104F-0CE3-4B9D-88B3-35D982C36562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D860FEC-BA79-4FEE-A79C-88AA857358E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CEF8A6-2445-4B63-822D-81F6AC708D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D63F16DE-E30E-4268-B079-E07FD28355BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936DAD12-11D6-4AAF-B48D-5076C94BF30C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F11BB81D-8243-4B19-835C-6E0B4341894A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFB5A51-399C-4AC5-BA09-E74C5AD520EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D5DAA-8279-4A4F-A843-EBA0814952BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABAF1125-B4F7-4BC9-B9DA-CA9125D4BC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA8490E-45D6-4B6E-AF98-B75385574D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06499DE1-DA07-4C39-BBAC-FC57F4E0D4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A87E241-4E74-4F89-8E5A-1A3980A5DDDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4325860-834E-4042-BDB2-5EB5A2D0F1F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0765F36F-94F8-45BE-8AF9-3373E5E567F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC0F50A0-5F1D-4D30-B5F3-C94C44C323D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A8AC04-8182-4BF2-9FDA-B2D607222EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082596F0-6707-4175-A9CB-868D853F7362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74A47464-BB99-44BB-A1B7-D8469BEAF408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12882E19-1107-48E7-9ECD-A2891B8900D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896688AD-84FF-4270-8F44-61764C0052B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1646C42-B42B-451F-9B9D-AEE7CF74E9C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9729F36E-F830-4397-8B0E-A91BF5601F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFEC0A8-69C2-4BE9-B510-5C111C6EE9BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "047CB3C6-C53C-4BA5-AB1C-5D739B30F9FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BF3506-7257-4E37-98AC-DDF0283C1FA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E0B274-5CFA-481E-8355-64D7BC16D871",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC5B69A-022B-4F8C-BAAC-97AFBAEA9730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63684C47-972B-45A3-9234-111F25FD35B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28CE6C6D-7D12-4E4F-BB76-54BF1C0A7B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4AFFB3-6117-4BCC-BE63-814042823182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F880C0CA-815A-49D2-8BA6-F220E3E467D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "989B6E1C-7681-4A11-B9F4-D94C47D57BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F75A1B08-CE1F-47A5-B706-104A62861932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E458521-2BD9-4719-9F83-6ECC3BC19B70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8762D1-5333-4EED-B31E-338052061237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67DCFA7E-734D-4FE0-913E-74D85564ABE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF502AE-BD3F-461B-9476-FB04818DA1F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "445022AC-A3CD-402E-AF44-2C1BC2B790E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF63765B-1BAE-4B53-9BA8-FDFDD2C58417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78245E2-BE22-4BD5-9252-44FF5815D7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1DF00E-1B1A-4FCA-BEEF-7D2BF9F001A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A093D4-A800-4F28-8480-85D62068CB35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F946429E-3362-41E5-88D9-FA01BE8D4312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48C9306-80AD-40CC-9516-E1B6F5A63556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6A5B34-780D-46F2-8DC8-F310F9201FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D78411-A542-48D7-B840-22290B3A98A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AABCC6-4CA4-4A2D-9DC6-D0AD6FF99BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58A1375C-4B33-4557-9BA0-D03EAC350D86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "783F6EC3-354C-4501-9557-E1BFFC0852DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8F48DC-E327-4B3D-BA52-901D21A6412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82004D25-6F97-4549-B98E-148E44134529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B32C5EE-D845-471C-85EA-DA5F9B04F01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E78C7A9B-7DCE-416F-909E-B3CC52AEBE9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "998DCE68-F426-47C5-80F7-BFE42FD69DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE04ADB-3037-41E8-8DF4-8588FDFB759A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D97C7A90-D8C6-4901-BCA1-E40DA173AA9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D94D7B29-565F-4E62-A958-27FFDDD7399E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "594DDCAB-96D4-4999-824E-7597B971B6DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8EA870-2228-4E81-A417-30E040A5C0E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "656D31B6-1E8D-4A44-9D7A-023051E7050A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49EEE5AA-3867-4137-B165-5004C34C77B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A38417-1DB2-4C85-80D9-D3968BF7A83B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74F99F83-A7E6-4AFD-BC42-7348EF6613AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A62A9F4-2B98-4F2D-9143-08D1689E38AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FD06CB-F456-44BD-900B-06131DC68B6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9044310E-4DF9-47BA-9D05-C1405DC8CDB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA881CDA-1C16-43F1-A7D5-69502512A21C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A473FF-F3AD-41F5-B63A-3D6DDB0BD216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2ED18E-241E-4154-9793-FB0E60F9C00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3A7AD3-D7D4-40A5-B1B6-A818B5ACE6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6EDB6772-7FDB-45FF-8D72-952902A7EE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9955F62A-75D3-4347-9AD3-5947FC365838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D77C7-A2F4-4700-AB5A-3EC853496ECA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "La compartici\u00f3n no transparente de selectores de predicci\u00f3n de rama entre contextos en algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio del acceso local"
}
],
"id": "CVE-2022-0001",
"lastModified": "2024-04-09T15:15:26.797",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-11T18:15:25.143",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"source": "secure@intel.com",
"url": "https://www.kb.cert.org/vuls/id/155143"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.