漏洞信息详情
多款Intel产品信息泄露漏洞
漏洞简介
Intel Xeon Scalable Processors等都是美国英特尔(Intel)公司的产品。Intel Xeon Scalable Processors是一款可扩展服务器中央处理器(CPU)。Intel Xeon Processor E7 v4 Family是一款Xeon E7系列服务器中央处理器(CPU)。Intel Xeon Processor E5 v4 Family是一款Xeon E5系列服务器中央处理器(CPU)。
多款Intel产品中存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。以下产品及版本受到影响:Intel Xeon Scalable Processors;Xeon Processor E7 v4 Family;Xeon Processor E5 v4 Family;Xeon Processor E3 v6 Family;Xeon Processor E3 v4 Family;Xeon Processor E;Xeon E Processor;Xeon D Processor;Puma;Pentium Processor Silver Series;Pentium Processor N Series;Pentium Processor J Series;Pentium Gold Processor Series;Mobile Communications Platforms;Microcode;Core X series Processors;Celeron Processor N Series;Celeron Processor J Series;Celeron Processor G Series;Atom Processor X Series;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor C Series;Atom Processor A Series;9th Generation Core i9 Processors;9th Generation Core i7 Processors;9th Generation Core i5 Processors;8th generation Core processors;7th generation Core processors;6th generation Core processors;5th generation Core processors;4th generation Core processors。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.intel.com/
参考网址
来源:UBUNTU
链接:https://usn.ubuntu.com/3977-3/
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2019-11091
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-12130
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-12127
来源:xenbits.xen.org
链接:http://xenbits.xen.org/xsa/advisory-297.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-12126
来源:portal.msrc.microsoft.com
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190013
来源:www.vmware.com
链接:https://www.vmware.com/security/advisories/VMSA-2019-0008.html
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
来源:aws.amazon.com
链接:https://aws.amazon.com/security/security-bulletins/AWS-2019-004/
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1705312
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1667782
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1646784
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1646781
来源:www.intel.com
链接:http://www.intel.com/content/www/us/en/homepage.html
来源:www.huawei.com
链接:http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn
来源:CONFIRM
链接:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
来源:securityadvisories.paloaltonetworks.com
链接:https://securityadvisories.paloaltonetworks.com/Home/Detail/150
来源:support.citrix.com
链接:https://support.citrix.com/article/CTX251995
来源:FREEBSD
链接:https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Jun/36
来源:CONFIRM
链接:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4602
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Nov/15
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2020/Jan/21
来源:GENTOO
链接:https://security.gentoo.org/glsa/202003-56
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1455
来源:CONFIRM
链接:https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2553
来源:CONFIRM
链接:http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Jun/28
来源:www.chromium.org
链接:https://www.chromium.org/chromium-os/mds-on-chromeos
来源:chromereleases.googleblog.com
链接:https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-chrome-os-m75.html
来源:CONFIRM
链接:https://www.synology.com/security/advisory/Synology_SA_19_24
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
来源:CONFIRM
链接:https://kc.mcafee.com/corporate/index?page=content&id=SB10292
来源:security.freebsd.org
链接:https://security.freebsd.org/advisories/FreeBSD-SA-19:07.mds.asc
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/3985-1/
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914052-1.html
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4444
来源:www.debian.org
链接:https://www.debian.org/security/2020/dsa-4602
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/05/msg00018.html
来源:support.apple.com
链接:https://support.apple.com/en-us/HT210119
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156920/Gentoo-Linux-Security-Advisory-202003-56.html
来源:www.huawei.com
链接:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/80874
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1118439
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/108330
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0127/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4255/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4321/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/81098
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/81030
来源:support.lenovo.com
链接:https://support.lenovo.com/us/en/product_security/LEN-26696
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0153/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152952/Ubuntu-Security-Notice-USN-3985-1.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-11091
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1107009
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155956/Debian-Security-Advisory-4602-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/81194
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.1794/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152942/Debian-Security-Advisory-4447-1.html
受影响实体
暂无
补丁
- Linux kernel 安全漏洞的修复措施<!--2019-5-15-->
还没有评论,来说两句吧...