漏洞信息详情
多款Intel产品信息泄露漏洞
漏洞简介
Intel Xeon Scalable Processors等都是美国英特尔(Intel)公司的产品。Intel Xeon Scalable Processors是一款可扩展服务器中央处理器(CPU)。Intel Xeon Processor E7 v4 Family是一款Xeon E7系列服务器中央处理器(CPU)。Intel Xeon Processor E5 v4 Family是一款Xeon E5系列服务器中央处理器(CPU)。
多款Intel产品中存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。以下产品及版本受到影响:Intel Xeon Scalable Processors;Xeon Processor E7 v4 Family;Xeon Processor E5 v4 Family;Xeon Processor E3 v6 Family;Xeon Processor E3 v4 Family;Xeon Processor E;Xeon E Processor;Xeon D Processor;Puma;Pentium Processor Silver Series;Pentium Processor N Series;Pentium Processor J Series;Pentium Gold Processor Series;Mobile Communications Platforms;Microcode;Core X series Processors;Celeron Processor N Series;Celeron Processor J Series;Celeron Processor G Series;Atom Processor X Series;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor C Series;Atom Processor A Series;9th Generation Core i9 Processors;9th Generation Core i7 Processors;9th Generation Core i5 Processors;8th generation Core processors;7th generation Core processors;6th generation Core processors;5th generation Core processors;4th generation Core processors。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.intel.com/
参考网址
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2019-11091
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-12130
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-12127
来源:xenbits.xen.org
链接:http://xenbits.xen.org/xsa/advisory-297.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-12126
来源:portal.msrc.microsoft.com
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190013
来源:www.vmware.com
链接:https://www.vmware.com/security/advisories/VMSA-2019-0008.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
来源:aws.amazon.com
链接:https://aws.amazon.com/security/security-bulletins/AWS-2019-004/
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1705312
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1667782
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1646784
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1646781
来源:www.intel.com
链接:http://www.intel.com/content/www/us/en/homepage.html
来源:www.chromium.org
链接:https://www.chromium.org/chromium-os/mds-on-chromeos
来源:securityadvisories.paloaltonetworks.com
链接:https://securityadvisories.paloaltonetworks.com/Home/Detail/150
来源:support.citrix.com
链接:https://support.citrix.com/article/CTX251995
来源:chromereleases.googleblog.com
链接:https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-chrome-os-m75.html
来源:www.huawei.com
链接:http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/3985-1/
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4444
来源:www.debian.org
链接:https://www.debian.org/security/2020/dsa-4602
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/05/msg00018.html
来源:security.freebsd.org
链接:https://security.freebsd.org/advisories/FreeBSD-SA-19:26.mcu.asc
来源:support.apple.com
链接:https://support.apple.com/en-us/HT210119
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156920/Gentoo-Linux-Security-Advisory-202003-56.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Intel-AMD-processors-information-disclosure-via-performance-measurement-29300
来源:www.huawei.com
链接:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/80874
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4358/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1118439
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/108330
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0127/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4255/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4321/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/81098
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/81030
来源:support.lenovo.com
链接:https://support.lenovo.com/us/en/product_security/LEN-26696
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0153/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152952/Ubuntu-Security-Notice-USN-3985-1.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1107009
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155956/Debian-Security-Advisory-4602-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152942/Debian-Security-Advisory-4447-1.html
受影响实体
暂无
补丁
- Linux 安全漏洞的修复措施<!--2019-5-15-->
还没有评论,来说两句吧...