MEDIUM
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html
https://access.redhat.com/errata/RHSA-2019:3916
https://access.redhat.com/errata/RHSA-2019:3936
https://access.redhat.com/errata/RHSA-2019:3941
https://access.redhat.com/errata/RHSA-2020:0026
https://access.redhat.com/errata/RHSA-2020:0028
https://access.redhat.com/errata/RHSA-2020:0204
https://seclists.org/bugtraq/2020/Jan/21
https://security.gentoo.org/glsa/202003-56
https://support.f5.com/csp/article/K17269881?utm_source=f5support&utm_medium=RSS
https://usn.ubuntu.com/4186-2/
https://www.debian.org/security/2020/dsa-4602
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html
Source: MITRE
Published: 2019-11-14
Updated: 2020-07-15
Type: CWE-20
Base Score: 4.9
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact Score: 6.9
Exploitability Score: 3.9
Severity: MEDIUM
Base Score: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Impact Score: 4
Exploitability Score: 2
Severity: MEDIUM
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-9900x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-9920x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-9960x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*
OR
AND
OR
cpe:2.3:o:intel:core_i9-9940x_x-series_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:extreme:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
OR
OR
OR
OR
OR
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.5 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.5 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 14.1.0 to 14.1.2 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 15.0.0 to 15.0.1 (inclusive)
cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* versions from 5.2.0 to 5.4.0 (inclusive)
cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* versions from 6.0.0 to 6.1.0 (inclusive)
cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
140019 | OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre) | Nessus | OracleVM Local Security Checks | critical |
138539 | Oracle Solaris Critical Patch Update : jul2020_SRU11_4_21_69_0 | Nessus | Solaris Local Security Checks | medium |
138415 | OracleVM 3.4 : xen (OVMSA-2020-0027) (deprecated) | Nessus | OracleVM Local Security Checks | low |
138230 | F5 Networks BIG-IP : Intel MCE vulnerability (K17269881) | Nessus | F5 Networks Local Security Checks | medium |
138011 | EulerOS Virtualization 3.0.6.0 : kvm (EulerOS-SA-2020-1792) | Nessus | Huawei Local Security Checks | high |
135525 | EulerOS 2.0 SP3 : kernel (EulerOS-SA-2020-1396) | Nessus | Huawei Local Security Checks | critical |
134964 | GLSA-202003-56 : Xen: Multiple vulnerabilities (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) | Nessus | Gentoo Local Security Checks | high |
134312 | NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2020-0021) | Nessus | NewStart CGSL Local Security Checks | high |
134172 | Xen Denial of Service vulnerability (XSA-304) | Nessus | Misc. | medium |
133913 | EulerOS 2.0 SP5 : kernel (EulerOS-SA-2020-1112) | Nessus | Huawei Local Security Checks | critical |
133763 | SUSE SLES12 Security Update : xen (SUSE-SU-2020:0388-1) | Nessus | SuSE Local Security Checks | high |
133539 | SUSE SLES12 Security Update : xen (SUSE-SU-2020:0334-1) | Nessus | SuSE Local Security Checks | high |
133221 | RHEL 8 : kernel (RHSA-2020:0204) | Nessus | Red Hat Local Security Checks | critical |
133072 | NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2020-0002) | Nessus | NewStart CGSL Local Security Checks | high |
132925 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0093-1) | Nessus | SuSE Local Security Checks | critical |
132875 | Debian DSA-4602-1 : xen - security update (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) | Nessus | Debian Local Security Checks | high |
132687 | RHEL 7 : kpatch-patch (RHSA-2020:0028) | Nessus | Red Hat Local Security Checks | low |
132685 | RHEL 7 : kpatch-patch (RHSA-2020:0026) | Nessus | Red Hat Local Security Checks | low |
132516 | openSUSE Security Update : spectre-meltdown-checker (openSUSE-2019-2710) | Nessus | SuSE Local Security Checks | low |
132499 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0266) | Nessus | NewStart CGSL Local Security Checks | high |
132490 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0264) | Nessus | NewStart CGSL Local Security Checks | high |
132337 | SUSE SLED15 / SLES15 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3348-1) | Nessus | SuSE Local Security Checks | low |
132334 | SUSE SLES12 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3340-1) | Nessus | SuSE Local Security Checks | low |
132073 | SUSE SLES12 Security Update : xen (SUSE-SU-2019:3297-1) | Nessus | SuSE Local Security Checks | high |
132071 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:3295-1) | Nessus | SuSE Local Security Checks | high |
131460 | Fedora 30 : xen (2019-cbb732f760) | Nessus | Fedora Local Security Checks | high |
131296 | FreeBSD : FreeBSD -- Machine Check Exception on Page Size Change (edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9) | Nessus | FreeBSD Local Security Checks | medium |
131272 | Oracle Linux 8 : kernel (ELSA-2019-3832) | Nessus | Oracle Linux Local Security Checks | low |
131242 | Amazon Linux AMI : kernel (ALAS-2019-1322) | Nessus | Amazon Linux Local Security Checks | medium |
131235 | Amazon Linux 2 : kernel (ALAS-2019-1366) | Nessus | Amazon Linux Local Security Checks | medium |
131227 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-089) | Nessus | Virtuozzo Local Security Checks | high |
131208 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0056) | Nessus | OracleVM Local Security Checks | high |
131177 | RHEL 8 : kpatch-patch (RHSA-2019:3936) | Nessus | Red Hat Local Security Checks | low |
131174 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4850) | Nessus | Oracle Linux Local Security Checks | high |
131150 | OracleVM 3.4 : xen (OVMSA-2019-0054) | Nessus | OracleVM Local Security Checks | medium |
131143 | Fedora 31 : xen (2019-376ec5c107) | Nessus | Fedora Local Security Checks | high |
131120 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2984-1) | Nessus | SuSE Local Security Checks | critical |
131110 | Oracle Linux 7 : kernel (ELSA-2019-3834) | Nessus | Oracle Linux Local Security Checks | low |
131064 | openSUSE Security Update : qemu (openSUSE-2019-2510) | Nessus | SuSE Local Security Checks | medium |
131062 | openSUSE Security Update : xen (openSUSE-2019-2508) | Nessus | SuSE Local Security Checks | high |
131061 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-2507) | Nessus | SuSE Local Security Checks | high |
131060 | openSUSE Security Update : xen (openSUSE-2019-2506) | Nessus | SuSE Local Security Checks | high |
131059 | openSUSE Security Update : qemu (openSUSE-2019-2505) | Nessus | SuSE Local Security Checks | low |
131057 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-2503) | Nessus | SuSE Local Security Checks | high |
131032 | CentOS 7 : kernel (CESA-2019:3834) | Nessus | CentOS Local Security Checks | low |
131018 | VMSA-2019-0020 : Hypervisor-Specific Mitigations for Denial-of-Service and Speculative-Execution Vulnerabilities | Nessus | VMware ESX Local Security Checks | low |
131014 | Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3) | Nessus | Ubuntu Local Security Checks | high |
131013 | Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerability and regression (USN-4185-3) | Nessus | Ubuntu Local Security Checks | high |
131012 | Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerability and regression (USN-4184-2) | Nessus | Ubuntu Local Security Checks | high |
131011 | Ubuntu 19.10 : Linux kernel vulnerability (USN-4183-2) | Nessus | Ubuntu Local Security Checks | high |
131007 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20191113) | Nessus | Scientific Linux Local Security Checks | low |
131006 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20191113) | Nessus | Scientific Linux Local Security Checks | low |
130999 | RHEL 7 : Virtualization Manager (RHSA-2019:3860) | Nessus | Red Hat Local Security Checks | low |
130998 | RHEL 6 : MRG (RHSA-2019:3844) | Nessus | Red Hat Local Security Checks | low |
130995 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4837) | Nessus | Oracle Linux Local Security Checks | low |
130994 | Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4836) | Nessus | Oracle Linux Local Security Checks | low |
130993 | Oracle Linux 6 : kernel (ELSA-2019-3836) | Nessus | Oracle Linux Local Security Checks | low |
130989 | Fedora 29 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-7a3fc17778) | Nessus | Fedora Local Security Checks | high |
130982 | Debian DSA-4564-1 : linux - security update | Nessus | Debian Local Security Checks | high |
130979 | Debian DLA-1990-1 : linux-4.9 security update | Nessus | Debian Local Security Checks | high |
130978 | CentOS 6 : kernel (CESA-2019:3836) | Nessus | CentOS Local Security Checks | low |
130966 | Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4186-1) | Nessus | Ubuntu Local Security Checks | high |
130965 | Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4185-1) | Nessus | Ubuntu Local Security Checks | high |
130964 | Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerabilities (USN-4184-1) | Nessus | Ubuntu Local Security Checks | high |
130963 | Ubuntu 19.10 : Linux kernel vulnerabilities (USN-4183-1) | Nessus | Ubuntu Local Security Checks | high |
130960 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2019:2962-1) | Nessus | SuSE Local Security Checks | high |
130959 | SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2019:2961-1) | Nessus | SuSE Local Security Checks | high |
130958 | SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2019:2960-1) | Nessus | SuSE Local Security Checks | high |
130954 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2019:2956-1) | Nessus | SuSE Local Security Checks | low |
130953 | SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2019:2955-1) | Nessus | SuSE Local Security Checks | medium |
130952 | SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2019:2954-1) | Nessus | SuSE Local Security Checks | low |
130951 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2953-1) | Nessus | SuSE Local Security Checks | high |
130950 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic) | Nessus | SuSE Local Security Checks | critical |
130949 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2949-1) | Nessus | SuSE Local Security Checks | critical |
130948 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:2948-1) | Nessus | SuSE Local Security Checks | high |
130947 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2947-1) | Nessus | SuSE Local Security Checks | high |
130946 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2946-1) | Nessus | SuSE Local Security Checks | high |
130935 | RHEL 6 : kernel (RHSA-2019:3843) | Nessus | Red Hat Local Security Checks | low |
130934 | RHEL 6 : kernel (RHSA-2019:3842) | Nessus | Red Hat Local Security Checks | low |
130933 | RHEL 7 : kernel (RHSA-2019:3841) | Nessus | Red Hat Local Security Checks | high |
130932 | RHEL 7 : kernel (RHSA-2019:3840) | Nessus | Red Hat Local Security Checks | low |
130931 | RHEL 7 : kernel (RHSA-2019:3839) | Nessus | Red Hat Local Security Checks | low |
130930 | RHEL 7 : kernel (RHSA-2019:3838) | Nessus | Red Hat Local Security Checks | low |
130929 | RHEL 7 : kernel (RHSA-2019:3837) | Nessus | Red Hat Local Security Checks | low |
130928 | RHEL 6 : kernel (RHSA-2019:3836) | Nessus | Red Hat Local Security Checks | low |
130927 | RHEL 7 : kernel-rt (RHSA-2019:3835) | Nessus | Red Hat Local Security Checks | low |
130926 | RHEL 7 : kernel (RHSA-2019:3834) | Nessus | Red Hat Local Security Checks | low |
130925 | RHEL 8 : kernel-rt (RHSA-2019:3833) | Nessus | Red Hat Local Security Checks | low |
130924 | RHEL 8 : kernel (RHSA-2019:3832) | Nessus | Red Hat Local Security Checks | low |
130923 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0052) | Nessus | OracleVM Local Security Checks | low |
130920 | Fedora 31 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-68d7f68507) | Nessus | Fedora Local Security Checks | high |
130919 | Fedora 30 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-1689d3fe07) | Nessus | Fedora Local Security Checks | high |
130910 | KB4525253: Windows Server 2012 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130909 | KB4525250: Windows 8.1 and Windows Server 2012 R2 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130908 | KB4525241: Windows 10 Version 1709 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130907 | KB4525237: Windows 10 Version 1803 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130906 | KB4525236: Windows 10 Version 1607 and Windows Server 2016 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130905 | KB4525233: Windows 7 and Windows Server 2008 R2 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130903 | KB4525232: Windows 10 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130902 | KB4524570: Windows 10 Version 1903 and Windows 10 Version 1909 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
130901 | KB4523205: Windows 10 Version 1809 and Windows Server 2019 November 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |