Product:

Enterprise_linux_server

(Redhat)
Repositories https://github.com/torvalds/linux
https://github.com/krb5/krb5
https://github.com/ceph/ceph
https://github.com/libarchive/libarchive
https://github.com/kyz/libmspack
https://github.com/LibRaw/LibRaw
https://github.com/rubygems/rubygems
https://github.com/madler/zlib
https://github.com/the-tcpdump-group/tcpdump
https://github.com/fedora-selinux/setroubleshoot
https://github.com/mdadams/jasper
https://github.com/ntp-project/ntp
https://github.com/neomutt/neomutt
https://github.com/mm2/Little-CMS
https://github.com/openbsd/src
https://github.com/abrt/abrt
https://github.com/mysql/mysql-server
https://github.com/golang/go
• git://git.openssl.org/openssl.git
https://github.com/dajobe/raptor
https://github.com/Katello/katello
https://github.com/opencontainers/runc
https://github.com/openstack/swift
https://github.com/qos-ch/slf4j
https://github.com/uclouvain/openjpeg
https://github.com/SELinuxProject/selinux
https://github.com/ClusterLabs/pacemaker
https://github.com/FreeRDP/FreeRDP
https://github.com/Perl/perl5
https://github.com/jpirko/libndp
https://github.com/candlepin/subscription-manager
https://github.com/dogtagpki/pki
https://github.com/szukw000/openjpeg
https://github.com/rpm-software-management/yum-utils
https://github.com/sosreport/sos-collector
https://github.com/requests/requests
https://github.com/glennrp/libpng
https://github.com/paramiko/paramiko
https://github.com/ImageMagick/ImageMagick
https://github.com/git/git
https://github.com/karelzak/util-linux
https://github.com/GNOME/evince
https://git.savannah.gnu.org/git/patch.git
https://github.com/UNINETT/mod_auth_mellon
https://github.com/flori/json
https://github.com/flatpak/flatpak
https://github.com/libguestfs/hivex
https://github.com/vadz/libtiff
https://github.com/jquery/jquery-ui
#Vulnerabilities 1891
Date Id Summary Products Score Patch Annotated
2019-08-20 CVE-2019-10086 In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. Commons_beanutils, Nifi, Debian_linux, Fedora, Leap, Agile_plm, Agile_product_lifecycle_management_integration_pack, Application_testing_suite, Banking_platform, Blockchain_platform, Communications_billing_and_revenue_management, Communications_billing_and_revenue_management_elastic_charging_engine, Communications_cloud_native_core_console, Communications_cloud_native_core_policy, Communications_cloud_native_core_unified_data_repository, Communications_convergence, Communications_design_studio, Communications_evolved_communications_application_server, Communications_metasolv_solution, Communications_network_integrity, Communications_performance_intelligence_center, Communications_pricing_design_center, Communications_unified_inventory_management, Customer_management_and_segmentation_foundation, Enterprise_manager_for_virtualization, Financial_services_revenue_management_and_billing_analytics, Flexcube_private_banking, Fusion_middleware, Healthcare_foundation, Hospitality_opera_5, Hospitality_reporting_and_analytics, Insurance_data_gateway, Jd_edwards_enterpriseone_orchestrator, Jd_edwards_enterpriseone_tools, Peoplesoft_enterprise_peopletools, Peoplesoft_enterprise_pt_peopletools, Primavera_gateway, Real\-Time_decisions_solutions, Retail_advanced_inventory_planning, Retail_back_office, Retail_central_office, Retail_invoice_matching, Retail_merchandising_system, Retail_point\-Of\-Service, Retail_predictive_application_server, Retail_price_management, Retail_returns_management, Retail_xstore_point_of_service, Service_bus, Solaris_cluster, Time_and_labor, Utilities_framework, Weblogic_server, Enterprise_linux_desktop, Enterprise_linux_eus, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Jboss_enterprise_application_platform 7.3
2019-09-06 CVE-2019-14813 A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands. Ghostscript, Debian_linux, Fedora, Leap, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Openshift_container_platform 9.8
2019-10-01 CVE-2019-17055 base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21. Ubuntu_linux, Debian_linux, Fedora, Linux_kernel, Leap, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation 3.3
2019-10-16 CVE-2019-2949 Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can... Ubuntu_linux, Debian_linux, Epolicy_orchestrator, E\-Series_santricity_os_controller, E\-Series_santricity_storage_manager, E\-Series_santricity_unified_manager, E\-Series_santricity_web_services_proxy, Oncommand_workflow_automation, Snapmanager, Leap, Jdk, Jre, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation 6.8
2019-10-17 CVE-2019-14287 In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. Ubuntu_linux, Debian_linux, Fedora, Element_software_management_node, Leap, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_eus, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Openshift_container_platform, Virtualization, Sudo 8.8
2019-10-24 CVE-2019-17596 Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates. Cloudvision_portal, Eos, Mos, Terminattr, Debian_linux, Fedora, Go, Leap, Developer_tools, Enterprise_linux, Enterprise_linux_server 7.5
2019-11-14 CVE-2018-12207 Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. Ubuntu_linux, Debian_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Iq_centralized_management, Enterprise_manager, Fedora, Celeron_g1610_firmware, Celeron_g1610t_firmware, Celeron_g1620_firmware, Celeron_g1620t_firmware, Celeron_g1630_firmware, Celeron_g1820_firmware, Celeron_g1820t_firmware, Celeron_g1820te_firmware, Celeron_g1830_firmware, Celeron_g1840_firmware, Celeron_g1840t_firmware, Celeron_g1850_firmware, Celeron_g3900_firmware, Celeron_g3900e_firmware, Celeron_g3900t_firmware, Celeron_g3900te_firmware, Celeron_g3902e_firmware, Celeron_g3920_firmware, Celeron_g3930_firmware, Celeron_g3930e_firmware, Celeron_g3930t_firmware, Celeron_g3930te_firmware, Celeron_g3950_firmware, Celeron_g4900_firmware, Celeron_g4900t_firmware, Celeron_g4920_firmware, Celeron_g4930_firmware, Celeron_g4930e_firmware, Celeron_g4930t_firmware, Celeron_g4932e_firmware, Celeron_g4950_firmware, Core_i3\-1005g1_firmware, Core_i3\-10110u_firmware, Core_i3\-10110y_firmware, Core_i3\-5005u_firmware, Core_i3\-5010u_firmware, Core_i3\-5015u_firmware, Core_i3\-5020u_firmware, Core_i3\-5157u_firmware, Core_i3\-6100_firmware, Core_i3\-6100h_firmware, Core_i3\-6100u_firmware, Core_i3\-6167u_firmware, Core_i3\-7100_firmware, Core_i3\-7100h_firmware, Core_i3\-7100t_firmware, Core_i3\-7100u_firmware, Core_i3\-7167u_firmware, Core_i3\-7300_firmware, Core_i3\-7300t_firmware, Core_i3\-7320_firmware, Core_i3\-7350k_firmware, Core_i3\-8100_firmware, Core_i3\-8100t_firmware, Core_i3\-8109u_firmware, Core_i3\-8130u_firmware, Core_i3\-8145u_firmware, Core_i3\-8300_firmware, Core_i3\-8300t_firmware, Core_i3\-8350k_firmware, Core_i3\-9100_firmware, Core_i3\-9100t_firmware, Core_i3\-9300_firmware, Core_i3\-9300t_firmware, Core_i3\-9320_firmware, Core_i3\-9350k_firmware, Core_i5\+8400_firmware, Core_i5\+8500_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-5200u_firmware, Core_i5\-5250u_firmware, Core_i5\-5257u_firmware, Core_i5\-5287u_firmware, Core_i5\-5350h_firmware, Core_i5\-6200u_firmware, Core_i5\-6260u_firmware, Core_i5\-6267u_firmware, Core_i5\-6287u_firmware, Core_i5\-6300hq_firmware, Core_i5\-6350hq_firmware, Core_i5\-7200u_firmware, Core_i5\-7260u_firmware, Core_i5\-7267u_firmware, Core_i5\-7287u_firmware, Core_i5\-7300hq_firmware, Core_i5\-7360u_firmware, Core_i5\-7400_firmware, Core_i5\-7400t_firmware, Core_i5\-7440hq_firmware, Core_i5\-7500_firmware, Core_i5\-7500t_firmware, Core_i5\-7600_firmware, Core_i5\-7600k_firmware, Core_i5\-7600t_firmware, Core_i5\-7y54_firmware, Core_i5\-8200y_firmware, Core_i5\-8250u_firmware, Core_i5\-8259u_firmware, Core_i5\-8265u_firmware, Core_i5\-8269u_firmware, Core_i5\-8300h_firmware, Core_i5\-8305g_firmware, Core_i5\-8350u_firmware, Core_i5\-8400_firmware, Core_i5\-8400b_firmware, Core_i5\-8400t_firmware, Core_i5\-8500b_firmware, Core_i5\-8700b_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400h_firmware, Core_i5\-9400t_firmware, Core_i5\-9500_firmware, Core_i5\-9500t_firmware, Core_i5\-9600_firmware, Core_i5\-9600k_firmware, Core_i5\-9600t_firmware, Core_i7\+8700_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-5500u_firmware, Core_i7\-5550u_firmware, Core_i7\-5557u_firmware, Core_i7\-5700hq_firmware, Core_i7\-5750hq_firmware, Core_i7\-5775c_firmware, Core_i7\-5850hq_firmware, Core_i7\-5950hq_firmware, Core_i7\-6500u_firmware, Core_i7\-6560u_firmware, Core_i7\-6567u_firmware, Core_i7\-6700hq_firmware, Core_i7\-6770hq_firmware, Core_i7\-6820hk_firmware, Core_i7\-6870hq_firmware, Core_i7\-6970hq_firmware, Core_i7\-7500u_firmware, Core_i7\-7560u_firmware, Core_i7\-7567u_firmware, Core_i7\-7660u_firmware, Core_i7\-7700_firmware, Core_i7\-7700hq_firmware, Core_i7\-7700k_firmware, Core_i7\-7700t_firmware, Core_i7\-7800x_firmware, Core_i7\-7820hk_firmware, Core_i7\-7820hq_firmware, Core_i7\-7820x_firmware, Core_i7\-7920hq_firmware, Core_i7\-8086k_firmware, Core_i7\-8500y_firmware, Core_i7\-8550u_firmware, Core_i7\-8559u_firmware, Core_i7\-8565u_firmware, Core_i7\-8650u_firmware, Core_i7\-8705g_firmware, Core_i7\-8706g_firmware, Core_i7\-8709g_firmware, Core_i7\-8750h_firmware, Core_i7\-8809g_firmware, Core_i7\-9700_firmware, Core_i7\-9700k_firmware, Core_i7\-9700t_firmware, Core_i7\-9750h_firmware, Core_i7\-9850h_firmware, Core_i9\-10900x_x\-Series_firmware, Core_i9\-10920x_x\-Series_firmware, Core_i9\-10940x_x\-Series_firmware, Core_i9\-10980xe_firmware, Core_i9\-7900x_firmware, Core_i9\-7920x_firmware, Core_i9\-7940x_firmware, Core_i9\-7960x_firmware, Core_i9\-7980xe_firmware, Core_i9\-9900x_x\-Series_firmware, Core_i9\-9920x_x\-Series_firmware, Core_i9\-9940x_x\-Series_firmware, Core_i9\-9960x_x\-Series_firmware, Core_i9\-9980xe_firmware, Core_m3\-6y30_firmware, Core_m3\-6y54_firmware, Core_m3\-7y30_firmware, Core_m3\-8100y_firmware, Core_m\-5y10_firmware, Core_m\-5y10a_firmware, Core_m\-5y10c_firmware, Core_m\-5y31_firmware, Core_m\-5y51_firmware, Core_m\-5y70_firmware, Core_m\-5y71_firmware, Pentium_gold_4410y_firmware, Pentium_gold_4415u_firmware, Pentium_gold_4415y_firmware, Pentium_gold_4417u_firmware, Pentium_gold_4425y_firmware, Pentium_gold_5405u_firmware, Pentium_gold_6405u_firmware, Pentium_gold_g5400_firmware, Pentium_gold_g5400t_firmware, Pentium_gold_g5420_firmware, Pentium_gold_g5420t_firmware, Pentium_gold_g5500_firmware, Pentium_gold_g5500t_firmware, Pentium_gold_g5600_firmware, Pentium_gold_g5600t_firmware, Pentium_gold_g5620_firmware, Xeon_3040_firmware, Xeon_3050_firmware, Xeon_3060_firmware, Xeon_3065_firmware, Xeon_3070_firmware, Xeon_5030_firmware, Xeon_5040_firmware, Xeon_5050_firmware, Xeon_5060_firmware, Xeon_5063_firmware, Xeon_5070_firmware, Xeon_5080_firmware, Xeon_5110_firmware, Xeon_5120_firmware, Xeon_5130_firmware, Xeon_5140_firmware, Xeon_5150_firmware, Xeon_5160_firmware, Xeon_7020_firmware, Xeon_7030_firmware, Xeon_7040_firmware, Xeon_7041_firmware, Xeon_7110m_firmware, Xeon_7110n_firmware, Xeon_7120m_firmware, Xeon_7120n_firmware, Xeon_7130m_firmware, Xeon_7130n_firmware, Xeon_7140m_firmware, Xeon_7140n_firmware, Xeon_7150n_firmware, Xeon_bronze_3204_firmware, Xeon_d\-1513n_firmware, Xeon_d\-1518_firmware, Xeon_d\-1520_firmware, Xeon_d\-1521_firmware, Xeon_d\-1523n_firmware, Xeon_d\-1527_firmware, Xeon_d\-1528_firmware, Xeon_d\-1529_firmware, Xeon_d\-1531_firmware, Xeon_d\-1533n_firmware, Xeon_d\-1537_firmware, Xeon_d\-1539_firmware, Xeon_d\-1540_firmware, Xeon_d\-1541_firmware, Xeon_d\-1543n_firmware, Xeon_d\-1548_firmware, Xeon_d\-1553n_firmware, Xeon_d\-1557_firmware, Xeon_d\-1559_firmware, Xeon_d\-1567_firmware, Xeon_d\-1571_firmware, Xeon_d\-1577_firmware, Xeon_d\-1602_firmware, Xeon_d\-1622_firmware, Xeon_d\-1623n_firmware, Xeon_d\-1627_firmware, Xeon_d\-1633n_firmware, Xeon_d\-1637_firmware, Xeon_d\-1649n_firmware, Xeon_d\-1653n_firmware, Xeon_d\-2123it_firmware, Xeon_d\-2141i_firmware, Xeon_d\-2142it_firmware, Xeon_d\-2143it_firmware, Xeon_d\-2145nt_firmware, Xeon_d\-2146nt_firmware, Xeon_d\-2161i_firmware, Xeon_d\-2163it_firmware, Xeon_d\-2166nt_firmware, Xeon_d\-2173it_firmware, Xeon_d\-2177nt_firmware, Xeon_d\-2183it_firmware, Xeon_d\-2187nt_firmware, Xeon_d\-2191_firmware, Xeon_e3110_firmware, Xeon_e3120_firmware, Xeon_e3\-1220_v3_firmware, Xeon_e3\-1220_v5_firmware, Xeon_e3\-1220_v6_firmware, Xeon_e3\-1220l_v3_firmware, Xeon_e3\-1225_v3_firmware, Xeon_e3\-1225_v5_firmware, Xeon_e3\-1225_v6_firmware, Xeon_e3\-1226_v3_firmware, Xeon_e3\-1230_v5_firmware, Xeon_e3\-1230_v6_firmware, Xeon_e3\-1230l_v3_firmware, Xeon_e3\-1231_v3_firmware, Xeon_e3\-1235l_v5_firmware, Xeon_e3\-1240_v5_firmware, Xeon_e3\-1240_v6_firmware, Xeon_e3\-1240l_v3_firmware, Xeon_e3\-1240l_v5_firmware, Xeon_e3\-1241_v3_firmware, Xeon_e3\-1245_v5_firmware, Xeon_e3\-1245_v6_firmware, Xeon_e3\-1246_v3_firmware, Xeon_e3\-1260l_v5_firmware, Xeon_e3\-1265l_v3_firmware, Xeon_e3\-1265l_v4_firmware, Xeon_e3\-1268l_v5_firmware, Xeon_e3\-1270_v5_firmware, Xeon_e3\-1270_v6_firmware, Xeon_e3\-1271_v3_firmware, Xeon_e3\-1275_v3_firmware, Xeon_e3\-1275_v5_firmware, Xeon_e3\-1275_v6_firmware, Xeon_e3\-1276_v3_firmware, Xeon_e3\-1280_v5_firmware, Xeon_e3\-1280_v6_firmware, Xeon_e3\-1281_v3_firmware, Xeon_e3\-1285_v4_firmware, Xeon_e3\-1285l_v4_firmware, Xeon_e3\-1505m_v5_firmware, Xeon_e3\-1505m_v6_firmware, Xeon_e3\-1515m_v5_firmware, Xeon_e3\-1535m_v5_firmware, Xeon_e3\-1535m_v6_firmware, Xeon_e3\-1545m_v5_firmware, Xeon_e3\-1558l_v5_firmware, Xeon_e3\-1565l_v5_firmware, Xeon_e3\-1575m_v5_firmware, Xeon_e3\-1585_v5_firmware, Xeon_e3\-1585l_v5_firmware, Xeon_e5205_firmware, Xeon_e5220_firmware, Xeon_e5240_firmware, Xeon_e5310_firmware, Xeon_e5320_firmware, Xeon_e5335_firmware, Xeon_e5345_firmware, Xeon_e5405_firmware, Xeon_e5410_firmware, Xeon_e5420_firmware, Xeon_e5430_firmware, Xeon_e5440_firmware, Xeon_e5450_firmware, Xeon_e5462_firmware, Xeon_e5472_firmware, Xeon_e5502_firmware, Xeon_e5503_firmware, Xeon_e5504_firmware, Xeon_e5506_firmware, Xeon_e5507_firmware, Xeon_e5520_firmware, Xeon_e5530_firmware, Xeon_e5540_firmware, Xeon_e5603_firmware, Xeon_e5606_firmware, Xeon_e5607_firmware, Xeon_e5620_firmware, Xeon_e5630_firmware, Xeon_e5640_firmware, Xeon_e5645_firmware, Xeon_e5649_firmware, Xeon_e5\-1620_v2_firmware, Xeon_e5\-1620_v3_firmware, Xeon_e5\-1620_v4_firmware, Xeon_e5\-1630_v3_firmware, Xeon_e5\-1630_v4_firmware, Xeon_e5\-1650_v2_firmware, Xeon_e5\-1650_v3_firmware, Xeon_e5\-1650_v4_firmware, Xeon_e5\-1660_v2_firmware, Xeon_e5\-1660_v3_firmware, Xeon_e5\-1660_v4_firmware, Xeon_e5\-1680_v3_firmware, Xeon_e5\-1680_v4_firmware, Xeon_e5\-2403_v2_firmware, Xeon_e5\-2407_v2_firmware, Xeon_e5\-2420_v2_firmware, Xeon_e5\-2430_v2_firmware, Xeon_e5\-2430l_v2_firmware, Xeon_e5\-2440_v2_firmware, Xeon_e5\-2450_v2_firmware, Xeon_e5\-2450l_v2_firmware, Xeon_e5\-2470_v2_firmware, Xeon_e5\-2603_v2_firmware, Xeon_e5\-2603_v3_firmware, Xeon_e5\-2603_v4_firmware, Xeon_e5\-2608l_v4_firmware, Xeon_e5\-2609_v2_firmware, Xeon_e5\-2609_v4_firmware, Xeon_e5\-2618l_v4_firmware, Xeon_e5\-2620_v2_firmware, Xeon_e5\-2620_v3_firmware, Xeon_e5\-2620_v4_firmware, Xeon_e5\-2623_v3_firmware, Xeon_e5\-2623_v4_firmware, Xeon_e5\-2628l_v4_firmware, Xeon_e5\-2630_v2_firmware, Xeon_e5\-2630_v3_firmware, Xeon_e5\-2630_v4_firmware, Xeon_e5\-2630l_v2_firmware, Xeon_e5\-2630l_v3_firmware, Xeon_e5\-2630l_v4_firmware, Xeon_e5\-2637_v2_firmware, Xeon_e5\-2637_v3_firmware, Xeon_e5\-2637_v4_firmware, Xeon_e5\-2640_v2_firmware, Xeon_e5\-2640_v3_firmware, Xeon_e5\-2640_v4_firmware, Xeon_e5\-2643_v2_firmware, Xeon_e5\-2643_v3_firmware, Xeon_e5\-2643_v4_firmware, Xeon_e5\-2648l_v4_firmware, Xeon_e5\-2650_v2_firmware, Xeon_e5\-2650_v3_firmware, Xeon_e5\-2650_v4_firmware, Xeon_e5\-2650l_v2_firmware, Xeon_e5\-2650l_v3_firmware, Xeon_e5\-2650l_v4_firmware, Xeon_e5\-2658_v4_firmware, Xeon_e5\-2660_v2_firmware, Xeon_e5\-2660_v3_firmware, Xeon_e5\-2660_v4_firmware, Xeon_e5\-2667_v2_firmware, Xeon_e5\-2667_v3_firmware, Xeon_e5\-2667_v4_firmware, Xeon_e5\-2670_v2_firmware, Xeon_e5\-2670_v3_firmware, Xeon_e5\-2680_v2_firmware, Xeon_e5\-2680_v3_firmware, Xeon_e5\-2680_v4_firmware, Xeon_e5\-2683_v3_firmware, Xeon_e5\-2683_v4_firmware, Xeon_e5\-2687w_v2_firmware, Xeon_e5\-2687w_v3_firmware, Xeon_e5\-2687w_v4_firmware, Xeon_e5\-2690_v2_firmware, Xeon_e5\-2690_v3_firmware, Xeon_e5\-2690_v4_firmware, Xeon_e5\-2695_v2_firmware, Xeon_e5\-2695_v3_firmware, Xeon_e5\-2695_v4_firmware, Xeon_e5\-2697_v2_firmware, Xeon_e5\-2697_v3_firmware, Xeon_e5\-2697_v4_firmware, Xeon_e5\-2697a_v4_firmware, Xeon_e5\-2698_v3_firmware, Xeon_e5\-2698_v4_firmware, Xeon_e5\-2699_v3_firmware, Xeon_e5\-2699_v4_firmware, Xeon_e5\-2699a_v4_firmware, Xeon_e5\-4603_v2_firmware, Xeon_e5\-4607_v2_firmware, Xeon_e5\-4610_v2_firmware, Xeon_e5\-4610_v3_firmware, Xeon_e5\-4610a_v4_firmware, Xeon_e5\-4620_v2_firmware, Xeon_e5\-4620_v3_firmware, Xeon_e5\-4620_v4_firmware, Xeon_e5\-4627_v2_firmware, Xeon_e5\-4627_v3_firmware, Xeon_e5\-4627_v4_firmware, Xeon_e5\-4628l_v4_firmware, Xeon_e5\-4640_v2_firmware, Xeon_e5\-4640_v3_firmware, Xeon_e5\-4640_v4_firmware, Xeon_e5\-4650_v2_firmware, Xeon_e5\-4650_v3_firmware, Xeon_e5\-4650_v4_firmware, Xeon_e5\-4655_v3_firmware, Xeon_e5\-4655_v4_firmware, Xeon_e5\-4657l_v2_firmware, Xeon_e5\-4660_v3_firmware, Xeon_e5\-4660_v4_firmware, Xeon_e5\-4667_v3_firmware, Xeon_e5\-4667_v4_firmware, Xeon_e5\-4669_v3_firmware, Xeon_e5\-4669_v4_firmware, Xeon_e6510_firmware, Xeon_e6540_firmware, Xeon_e7210_firmware, Xeon_e7220_firmware, Xeon_e7310_firmware, Xeon_e7320_firmware, Xeon_e7330_firmware, Xeon_e7340_firmware, Xeon_e7420_firmware, Xeon_e7430_firmware, Xeon_e7440_firmware, Xeon_e7450_firmware, Xeon_e7520_firmware, Xeon_e7530_firmware, Xeon_e7540_firmware, Xeon_e7\-2850_v2_firmware, Xeon_e7\-2870_v2_firmware, Xeon_e7\-2880_v2_firmware, Xeon_e7\-2890_v2_firmware, Xeon_e7\-4809_v2_firmware, Xeon_e7\-4809_v3_firmware, Xeon_e7\-4809_v4_firmware, Xeon_e7\-4820_v2_firmware, Xeon_e7\-4820_v3_firmware, Xeon_e7\-4820_v4_firmware, Xeon_e7\-4830_v2_firmware, Xeon_e7\-4830_v3_firmware, Xeon_e7\-4830_v4_firmware, Xeon_e7\-4850_v2_firmware, Xeon_e7\-4850_v3_firmware, Xeon_e7\-4850_v4_firmware, Xeon_e7\-4860_v2_firmware, Xeon_e7\-4870_v2_firmware, Xeon_e7\-4880_v2_firmware, Xeon_e7\-4890_v2_firmware, Xeon_e7\-8850_v2_firmware, Xeon_e7\-8855_v4_firmware, Xeon_e7\-8857_v2_firmware, Xeon_e7\-8860_v3_firmware, Xeon_e7\-8860_v4_firmware, Xeon_e7\-8867_v3_firmware, Xeon_e7\-8867_v4_firmware, Xeon_e7\-8870_v2_firmware, Xeon_e7\-8870_v3_firmware, Xeon_e7\-8870_v4_firmware, Xeon_e7\-8880_v2_firmware, Xeon_e7\-8880_v3_firmware, Xeon_e7\-8880_v4_firmware, Xeon_e7\-8880l_v2_firmware, Xeon_e7\-8880l_v3_firmware, Xeon_e7\-8890_v2_firmware, Xeon_e7\-8890_v3_firmware, Xeon_e7\-8890_v4_firmware, Xeon_e7\-8891_v2_firmware, Xeon_e7\-8891_v3_firmware, Xeon_e7\-8891_v4_firmware, Xeon_e7\-8893_v2_firmware, Xeon_e7\-8893_v3_firmware, Xeon_e7\-8893_v4_firmware, Xeon_e7\-8895_v2_firmware, Xeon_e\-2104g_firmware, Xeon_e\-2124_firmware, Xeon_e\-2124g_firmware, Xeon_e\-2126g_firmware, Xeon_e\-2134_firmware, Xeon_e\-2136_firmware, Xeon_e\-2144g_firmware, Xeon_e\-2146g_firmware, Xeon_e\-2174g_firmware, Xeon_e\-2176g_firmware, Xeon_e\-2186g_firmware, Xeon_e\-2224_firmware, Xeon_e\-2224g_firmware, Xeon_e\-2226g_firmware, Xeon_e\-2234_firmware, Xeon_e\-2236_firmware, Xeon_e\-2244g_firmware, Xeon_e\-2246g_firmware, Xeon_e\-2274g_firmware, Xeon_e\-2276g_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2286g_firmware, Xeon_e\-2288g_firmware, Xeon_ec3539_firmware, Xeon_ec5509_firmware, Xeon_ec5539_firmware, Xeon_ec5549_firmware, Xeon_gold_5215_firmware, Xeon_gold_5215l_firmware, Xeon_gold_5215m_firmware, Xeon_gold_5217_firmware, Xeon_gold_5218_firmware, Xeon_gold_5218b_firmware, Xeon_gold_5218n_firmware, Xeon_gold_5218t_firmware, Xeon_gold_5220_firmware, Xeon_gold_5220s_firmware, Xeon_gold_5220t_firmware, Xeon_gold_5222_firmware, Xeon_gold_6222v_firmware, Xeon_gold_6226_firmware, Xeon_gold_6230_firmware, Xeon_gold_6230n_firmware, Xeon_gold_6230t_firmware, Xeon_gold_6234_firmware, Xeon_gold_6238_firmware, Xeon_gold_6238l_firmware, Xeon_gold_6238m_firmware, Xeon_gold_6238t_firmware, Xeon_gold_6240_firmware, Xeon_gold_6240l_firmware, Xeon_gold_6240m_firmware, Xeon_gold_6240y_firmware, Xeon_gold_6242_firmware, Xeon_gold_6244_firmware, Xeon_gold_6246_firmware, Xeon_gold_6248_firmware, Xeon_gold_6252_firmware, Xeon_gold_6252n_firmware, Xeon_gold_6254_firmware, Xeon_gold_6262v_firmware, Xeon_l3014_firmware, Xeon_l3110_firmware, Xeon_l3360_firmware, Xeon_l3406_firmware, Xeon_l3426_firmware, Xeon_l5215_firmware, Xeon_l5238_firmware, Xeon_l5240_firmware, Xeon_l5310_firmware, Xeon_l5318_firmware, Xeon_l5320_firmware, Xeon_l5335_firmware, Xeon_l5408_firmware, Xeon_l5410_firmware, Xeon_l5420_firmware, Xeon_l5430_firmware, Xeon_l5506_firmware, Xeon_l5508_firmware, Xeon_l5518_firmware, Xeon_l5520_firmware, Xeon_l5530_firmware, Xeon_l5609_firmware, Xeon_l5618_firmware, Xeon_l5630_firmware, Xeon_l5638_firmware, Xeon_l5640_firmware, Xeon_l7345_firmware, Xeon_l7445_firmware, Xeon_l7455_firmware, Xeon_l7545_firmware, Xeon_l7555_firmware, Xeon_lc3518_firmware, Xeon_lc3528_firmware, Xeon_lc5518_firmware, Xeon_lc5528_firmware, Xeon_lv_5113_firmware, Xeon_lv_5128_firmware, Xeon_lv_5133_firmware, Xeon_lv_5138_firmware, Xeon_lv_5148_firmware, Xeon_platinum_8253_firmware, Xeon_platinum_8256_firmware, Xeon_platinum_8260_firmware, Xeon_platinum_8260l_firmware, Xeon_platinum_8260m_firmware, Xeon_platinum_8260y_firmware, Xeon_platinum_8268_firmware, Xeon_platinum_8270_firmware, Xeon_platinum_8276_firmware, Xeon_platinum_8276l_firmware, Xeon_platinum_8276m_firmware, Xeon_platinum_8280_firmware, Xeon_platinum_8280l_firmware, Xeon_platinum_8280m_firmware, Xeon_platinum_9221_firmware, Xeon_platinum_9222_firmware, Xeon_platinum_9242_firmware, Xeon_platinum_9282_firmware, Xeon_silver_4208_firmware, Xeon_silver_4209t_firmware, Xeon_silver_4210_firmware, Xeon_silver_4214_firmware, Xeon_silver_4214y_firmware, Xeon_silver_4215_firmware, Xeon_silver_4216_firmware, Xeon_w3520_firmware, Xeon_w3530_firmware, Xeon_w3540_firmware, Xeon_w3550_firmware, Xeon_w3565_firmware, Xeon_w3570_firmware, Xeon_w3580_firmware, Xeon_w3670_firmware, Xeon_w3680_firmware, Xeon_w3690_firmware, Xeon_w5580_firmware, Xeon_w5590_firmware, Xeon_w\-2123_firmware, Xeon_w\-2125_firmware, Xeon_w\-2133_firmware, Xeon_w\-2135_firmware, Xeon_w\-2145_firmware, Xeon_w\-2155_firmware, Xeon_w\-2175_firmware, Xeon_w\-2195_firmware, Xeon_w\-2223_firmware, Xeon_w\-2225_firmware, Xeon_w\-2235_firmware, Xeon_w\-2245_firmware, Xeon_w\-2255_firmware, Xeon_w\-2265_firmware, Xeon_w\-2275_firmware, Xeon_w\-2295_firmware, Xeon_w\-3175x_firmware, Xeon_w\-3223_firmware, Xeon_w\-3225_firmware, Xeon_w\-3245_firmware, Xeon_w\-3245m_firmware, Xeon_w\-3265_firmware, Xeon_w\-3265m_firmware, Xeon_w\-3275_firmware, Xeon_w\-3275m_firmware, Xeon_x3210_firmware, Xeon_x3220_firmware, Xeon_x3230_firmware, Xeon_x3320_firmware, Xeon_x3330_firmware, Xeon_x3350_firmware, Xeon_x3360_firmware, Xeon_x3370_firmware, Xeon_x3380_firmware, Xeon_x3430_firmware, Xeon_x3440_firmware, Xeon_x3450_firmware, Xeon_x3460_firmware, Xeon_x3470_firmware, Xeon_x3480_firmware, Xeon_x5260_firmware, Xeon_x5270_firmware, Xeon_x5272_firmware, Xeon_x5355_firmware, Xeon_x5365_firmware, Xeon_x5450_firmware, Xeon_x5460_firmware, Xeon_x5470_firmware, Xeon_x5472_firmware, Xeon_x5482_firmware, Xeon_x5492_firmware, Xeon_x5550_firmware, Xeon_x5560_firmware, Xeon_x5570_firmware, Xeon_x5647_firmware, Xeon_x5650_firmware, Xeon_x5660_firmware, Xeon_x5667_firmware, Xeon_x5670_firmware, Xeon_x5672_firmware, Xeon_x5675_firmware, Xeon_x5677_firmware, Xeon_x5680_firmware, Xeon_x5687_firmware, Xeon_x5690_firmware, Xeon_x6550_firmware, Xeon_x7350_firmware, Xeon_x7460_firmware, Xeon_x7542_firmware, Xeon_x7550_firmware, Xeon_x7560_firmware, Leap, Solaris, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Openshift_container_platform 6.5
2019-11-14 CVE-2019-11135 TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. Ubuntu_linux, Debian_linux, Fedora, Apollo_2000_firmware, Apollo_4200_firmware, Proliant_bl460c_firmware, Proliant_dl120_firmware, Proliant_dl160_firmware, Proliant_dl180_firmware, Proliant_dl20_firmware, Proliant_dl360_firmware, Proliant_dl380_firmware, Proliant_dl560_firmware, Proliant_dl580_firmware, Proliant_e910_firmware, Proliant_ml110_firmware, Proliant_ml30_firmware, Proliant_ml350_firmware, Proliant_xl170r_firmware, Proliant_xl190r_firmware, Proliant_xl230k_firmware, Proliant_xl270d_firmware, Proliant_xl450_firmware, Synergy_480_firmware, Synergy_660_firmware, Celeron_5305u_firmware, Core_i5\-10110y_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-8200y_firmware, Core_i5\-8210y_firmware, Core_i5\-8265u_firmware, Core_i5\-8310y_firmware, Core_i5\-8365u_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400f_firmware, Core_i5\-9400h_firmware, Core_i5\-9600k_firmware, Core_i5\-9600kf_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-8500y_firmware, Core_i7\-8565u_firmware, Core_i7\-8665u_firmware, Core_i7\-9700k_firmware, Core_i7\-9700kf_firmware, Core_i7\-9750hf_firmware, Core_i7\-9850h_firmware, Core_i9\-9880h_firmware, Core_i9\-9900k_firmware, Core_i9\-9900kf_firmware, Core_i9\-9980hk_firmware, Core_m3\-8100y_firmware, Pentium_6405u_firmware, Xeon_3204_firmware, Xeon_3206r_firmware, Xeon_4208_firmware, Xeon_4208r_firmware, Xeon_4209t_firmware, Xeon_4210_firmware, Xeon_4210r_firmware, Xeon_4214_firmware, Xeon_4214c_firmware, Xeon_4214r_firmware, Xeon_4214y_firmware, Xeon_4215_firmware, Xeon_4216_firmware, Xeon_4216r_firmware, Xeon_5215_firmware, Xeon_5215l_firmware, Xeon_5215m_firmware, Xeon_5215r_firmware, Xeon_5217_firmware, Xeon_5218_firmware, Xeon_5218b_firmware, Xeon_5218n_firmware, Xeon_5218t_firmware, Xeon_5220_firmware, Xeon_5220r_firmware, Xeon_5220s_firmware, Xeon_5220t_firmware, Xeon_5222_firmware, Xeon_6222v_firmware, Xeon_6226_firmware, Xeon_6230_firmware, Xeon_6230n_firmware, Xeon_6230t_firmware, Xeon_6234_firmware, Xeon_6238_firmware, Xeon_6238l_firmware, Xeon_6238m_firmware, Xeon_6238t_firmware, Xeon_6240_firmware, Xeon_6240l_firmware, Xeon_6240m_firmware, Xeon_6240y_firmware, Xeon_6242_firmware, Xeon_6244_firmware, Xeon_6246_firmware, Xeon_6248_firmware, Xeon_6252_firmware, Xeon_6252n_firmware, Xeon_6254_firmware, Xeon_6262v_firmware, Xeon_8253_firmware, Xeon_8256_firmware, Xeon_8260_firmware, Xeon_8260l_firmware, Xeon_8260m_firmware, Xeon_8260y_firmware, Xeon_8268_firmware, Xeon_8270_firmware, Xeon_8276_firmware, Xeon_8276l_firmware, Xeon_8276m_firmware, Xeon_8280_firmware, Xeon_8280l_firmware, Xeon_8280m_firmware, Xeon_9220_firmware, Xeon_9221_firmware, Xeon_9222_firmware, Xeon_9242_firmware, Xeon_9282_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2278ge_firmware, Xeon_e\-2278gel_firmware, Xeon_e\-2286m_firmware, Xeon_e\-2288g_firmware, Xeon_w\-2223_firmware, Xeon_w\-2225_firmware, Xeon_w\-2235_firmware, Xeon_w\-2245_firmware, Xeon_w\-2255_firmware, Xeon_w\-2265_firmware, Xeon_w\-2275_firmware, Xeon_w\-2295_firmware, Xeon_w\-3223_firmware, Xeon_w\-3225_firmware, Xeon_w\-3235_firmware, Xeon_w\-3245_firmware, Xeon_w\-3245m_firmware, Xeon_w\-3265_firmware, Xeon_w\-3265m_firmware, Xeon_w\-3275_firmware, Xeon_w\-3275m_firmware, Leap, Zfs_storage_appliance_kit, Codeready_linux_builder, Codeready_linux_builder_eus, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_eus, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Virtualization_manager, Slackware 6.5
2019-11-25 CVE-2019-13723 Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Fedora, Chrome, Backports, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation 8.8
2019-11-27 CVE-2019-10216 In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas. Ghostscript, 3scale_api_management, Enterprise_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8