var-202106-0349
Vulnerability from variot
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Security Fix(es):
-
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
1929858 - CVE-2021-27219 glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits 1948377 - Rebase RHV-H 4.3 EUS on RHGS 3.5.z on RHEL 7 - Batch Update 4 1957238 - Rebase RHV-H 4.3 EUS on RHEL 7.9.z #6 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1963258 - CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
-
6 ELS) - i386, x86_64
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:2301-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2301 Issue date: 2021-06-08 CVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 ==================================================================== 1. Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
-
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
-
hw: information disclosure on some Intel Atom processors (CVE-2020-24513)
Bug Fix(es) and Enhancement(s):
-
Update Intel CPU microcode to microcode-20210525 release
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
- Package List:
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source: microcode_ctl-2.1-22.39.el7_4.src.rpm
x86_64: microcode_ctl-2.1-22.39.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.39.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.4):
Source: microcode_ctl-2.1-22.39.el7_4.src.rpm
x86_64: microcode_ctl-2.1-22.39.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.39.el7_4.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.4):
Source: microcode_ctl-2.1-22.39.el7_4.src.rpm
x86_64: microcode_ctl-2.1-22.39.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.39.el7_4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/cve/CVE-2020-24513 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYMAhZtzjgjWX9erEAQgacA/8CSb4gKvVxCL/UEvQ8fD+Fuk7bVgGXgdl zfHALQmqxEvgcquECA1+0gVaALewsTbv0jYGt8ar3LXlNfdYvJyTZIkkTU7QPZX4 noIGXIk9Ljn6HDzNVq4+SzQGFhsy+eCyj0ksgLD1pYvSXZhMhIFoNs88qbn4vohF NWbr/79PFDN5Z8OD6eZ62dQuU0EBgR2/zQGhqEp2A5AIGyCpoGkeMjQbcEr8MTYw re11SdeDWdXudlgn6lCeVm1NB8/oaCRih7VTaNzHMTihyG2fS6Vfy9Tf1PcXXrZT 8r21wAISxES7QfMCxBB3jnlq+/3QYFG/dYLDZ8EDwa6ZCXyFRHirUQP6vrk9TG5k xVPIFH/QUwcWFaquGbvtpllAgn1tcSohpzMzDPqLIFSO031A1Xdn6JaYaUi9unO7 wOUS5MMYTJtXjQJ/lBjMFFCEMzGZ1VY74wwdHmyoBW9eA6DnfjTHsnhTpWvLbuHw fM0+/amC1YdZkMOmKWeSNkB0ESISQw6d7/pgT1px/ZyEktGtlnvOcybPpqVVFnnT 3llMAz6CW3UL59MvAvPk9dXKSeJBfsXVVQq21VVuNi/KHSE9tsYQnBgiVizDbrru npkQK4e+JU/GxTuioDK4/QrC89S9ZTvHcfiTFhpDt8DNxJdkmjjNi87m1UWfS1rL 3CqP9OqPU7Q=cruI -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i5-11500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10850k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-l13g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10885h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1195g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1120g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3150", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver j5040", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2820", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j6413", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10325", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3530", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n6000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10810u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10910", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3050", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1160g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3540", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n6005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4025", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3010", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j4205", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "core i3-1115gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2810", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1035g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10200h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145g7e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3060", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-11100b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j3710", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3510", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n6211", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n6415", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n5030", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3355e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11390h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "core i9-10900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2807", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1135g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-l16g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1800", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3060", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2815", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11320h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2808", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11370h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j6426", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2830", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n4200e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900kb", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5095", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11375h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j6412", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185g7e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3455", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n4200", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3350e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10870h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2910", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1060ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1005g1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1140g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n5105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1145gre", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4000c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1155g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1000ng4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4125", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1125g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10610u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2806", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1165g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3355", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1110g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10710u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4020", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1750", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4020c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1130g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1068ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1030g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115g4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n3000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j4115", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver n5000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10875h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1065g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10105t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1180g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n6210", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10100f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11800h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11260h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3520", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2805", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n2840", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-11700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-1038ng7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-1185g7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10305", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j2850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver j5005", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j3455e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j1900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-11950h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n3710", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-10900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j2900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n4505", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium silver a1030", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-11400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-1115g4e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2020-24489" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163043" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163757" } ], "trust": 0.9 }, "cve": "CVE-2020-24489", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-24489", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-178372", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-24489", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-24489", "trust": 1.0, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-178372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. \nThese packages include redhat-release-virtualization-host. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources\nand\nperforming administrative tasks. \n\nSecurity Fix(es):\n\n* glib: integer overflow in g_bytes_new function on 64-bit platforms due to\nan implicit cast from 64 bits to 32 bits (CVE-2021-27219)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* dhcp: stack-based buffer overflow when parsing statements with\ncolon-separated hex digits in config or lease files in dhcpd and dhclient\n(CVE-2021-25217)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n1929858 - CVE-2021-27219 glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits\n1948377 - Rebase RHV-H 4.3 EUS on RHGS 3.5.z on RHEL 7 - Batch Update 4\n1957238 - Rebase RHV-H 4.3 EUS on RHEL 7.9.z #6\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1963258 - CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient\n\n6. 6 ELS) - i386, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2021:2301-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2301\nIssue date: 2021-06-08\nCVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n CVE-2020-24513\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.4) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20210525 release\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4):\n\nSource:\nmicrocode_ctl-2.1-22.39.el7_4.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-22.39.el7_4.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-22.39.el7_4.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.4):\n\nSource:\nmicrocode_ctl-2.1-22.39.el7_4.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-22.39.el7_4.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-22.39.el7_4.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.4):\n\nSource:\nmicrocode_ctl-2.1-22.39.el7_4.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-22.39.el7_4.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-22.39.el7_4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/cve/CVE-2020-24513\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n3CqP9OqPU7Q=cruI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-24489" }, { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163043" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163757" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-24489", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "163047", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163040", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163043", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163031", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163240", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163036", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163037", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163044", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163042", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163242", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163032", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163046", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-178372", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163924", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163954", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163043" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "id": "VAR-202106-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-178372" } ], "trust": 0.01 }, "last_update_date": "2024-09-19T22:32:08.612000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://www.debian.org/security/2021/dsa-4934" }, { "trust": 1.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.9, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.9, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.9, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.9, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.8, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-24513" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24513" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0548" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25217" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27219" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25217" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27219" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2519" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2299" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2300" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2307" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2301" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2303" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3255" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3323" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3027" } ], "sources": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163043" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-178372" }, { "db": "PACKETSTORM", "id": "163240" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163043" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "NVD", "id": "CVE-2020-24489" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-09T00:00:00", "db": "VULHUB", "id": "VHN-178372" }, { "date": "2021-06-22T19:32:24", "db": "PACKETSTORM", "id": "163240" }, { "date": "2021-06-09T13:26:32", "db": "PACKETSTORM", "id": "163031" }, { "date": "2021-06-09T13:28:02", "db": "PACKETSTORM", "id": "163036" }, { "date": "2021-06-09T13:40:18", "db": "PACKETSTORM", "id": "163040" }, { "date": "2021-06-09T13:40:40", "db": "PACKETSTORM", "id": "163043" }, { "date": "2021-06-09T13:42:12", "db": "PACKETSTORM", "id": "163047" }, { "date": "2021-08-27T19:22:22", "db": "PACKETSTORM", "id": "163924" }, { "date": "2021-08-31T15:43:48", "db": "PACKETSTORM", "id": "163954" }, { "date": "2021-08-09T14:15:37", "db": "PACKETSTORM", "id": "163757" }, { "date": "2021-06-09T20:15:08.140000", "db": "NVD", "id": "CVE-2020-24489" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-06T00:00:00", "db": "VULHUB", "id": "VHN-178372" }, { "date": "2022-04-06T17:07:37.537000", "db": "NVD", "id": "CVE-2020-24489" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat Security Advisory 2021-2519-01", "sources": [ { "db": "PACKETSTORM", "id": "163240" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow", "sources": [ { "db": "PACKETSTORM", "id": "163240" } ], "trust": 0.1 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.