CVE-2019-11135

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

References

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html

http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html

http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

http://www.openwall.com/lists/oss-security/2019/12/10/3

http://www.openwall.com/lists/oss-security/2019/12/10/4

http://www.openwall.com/lists/oss-security/2019/12/11/1

https://access.redhat.com/errata/RHSA-2019:3936

https://access.redhat.com/errata/RHSA-2020:0026

https://access.redhat.com/errata/RHSA-2020:0028

https://access.redhat.com/errata/RHSA-2020:0204

https://access.redhat.com/errata/RHSA-2020:0279

https://access.redhat.com/errata/RHSA-2020:0366

https://access.redhat.com/errata/RHSA-2020:0555

https://access.redhat.com/errata/RHSA-2020:0666

https://access.redhat.com/errata/RHSA-2020:0730

https://kc.mcafee.com/corporate/index?page=content&id=SB10306

https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/

https://lists.fedoraproject.org/archives/list/[email protected]/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/

https://seclists.org/bugtraq/2019/Dec/28

https://seclists.org/bugtraq/2019/Nov/26

https://seclists.org/bugtraq/2020/Jan/21

https://security.gentoo.org/glsa/202003-56

https://support.f5.com/csp/article/K02912734?utm_source=f5support&utm_medium=RSS

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us

https://usn.ubuntu.com/4186-2/

https://www.debian.org/security/2020/dsa-4602

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html

https://www.oracle.com/security-alerts/cpujan2021.html

Details

Source: MITRE

Published: 2019-11-14

Updated: 2021-01-20

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Impact Score: 4

Exploitability Score: 2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:slackware:slackware:14.2:*:*:*:*:*:*:*

Configuration 4

AND

OR

cpe:2.3:o:hp:apollo_4200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:apollo_4200:gen10:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:o:hp:apollo_2000_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:apollo_2000:-:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:hp:proliant_bl460c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_bl460c:gen10:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:hp:proliant_dl580_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl580:gen10:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:hp:proliant_dl560_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl560:gen10:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:hp:proliant_dl380_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl380:gen10:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:hp:proliant_dl360_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl360:gen10:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:hp:proliant_dl180_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl180:gen10:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:hp:proliant_dl160_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl160:gen10:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:hp:proliant_dl120_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl120:gen10:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:hp:proliant_dl20_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_dl20:gen10:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:hp:proliant_ml350_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_ml350:gen10:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:hp:proliant_ml110_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_ml110:gen10:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:hp:proliant_ml30_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_ml30:gen10:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:hp:proliant_xl450_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl450:gen10:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:hp:proliant_xl270d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl270d:gen10:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:hp:proliant_xl230k_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl230k:gen10:*:*:*:*:*:*:*

Configuration 21

AND

OR

cpe:2.3:o:hp:proliant_xl190r_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl190r:gen10:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:hp:proliant_xl170r_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_xl170r:gen10:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:hp:synergy_480_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:synergy_480:gen10:*:*:*:*:*:*:*

Configuration 24

AND

OR

cpe:2.3:o:hp:synergy_660_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:synergy_660:gen10:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:hp:proliant_e910_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:hp:proliant_e910:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*

Configuration 29

AND

OR

cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*

Configuration 30

AND

OR

cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*

Configuration 31

AND

OR

cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*

Configuration 32

AND

OR

cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*

Configuration 33

AND

OR

cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*

Configuration 34

AND

OR

cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*

Configuration 35

AND

OR

cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8253:-:*:*:*:*:*:*:*

Configuration 36

AND

OR

cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8256:-:*:*:*:*:*:*:*

Configuration 37

AND

OR

cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260:-:*:*:*:*:*:*:*

Configuration 38

AND

OR

cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260l:-:*:*:*:*:*:*:*

Configuration 39

AND

OR

cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260m:-:*:*:*:*:*:*:*

Configuration 40

AND

OR

cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8260y:-:*:*:*:*:*:*:*

Configuration 41

AND

OR

cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8268:-:*:*:*:*:*:*:*

Configuration 42

AND

OR

cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8270:-:*:*:*:*:*:*:*

Configuration 43

AND

OR

cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8276:-:*:*:*:*:*:*:*

Configuration 44

AND

OR

cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8276l:-:*:*:*:*:*:*:*

Configuration 45

AND

OR

cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8276m:-:*:*:*:*:*:*:*

Configuration 46

AND

OR

cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8280:-:*:*:*:*:*:*:*

Configuration 47

AND

OR

cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8280l:-:*:*:*:*:*:*:*

Configuration 48

AND

OR

cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_8280m:-:*:*:*:*:*:*:*

Configuration 49

AND

OR

cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9220:-:*:*:*:*:*:*:*

Configuration 50

AND

OR

cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9221:-:*:*:*:*:*:*:*

Configuration 51

AND

OR

cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9222:-:*:*:*:*:*:*:*

Configuration 52

AND

OR

cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9242:-:*:*:*:*:*:*:*

Configuration 53

AND

OR

cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_9282:-:*:*:*:*:*:*:*

Configuration 54

AND

OR

cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215:-:*:*:*:*:*:*:*

Configuration 55

AND

OR

cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215l:-:*:*:*:*:*:*:*

Configuration 56

AND

OR

cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215m:-:*:*:*:*:*:*:*

Configuration 57

AND

OR

cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5215r:-:*:*:*:*:*:*:*

Configuration 58

AND

OR

cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5217:-:*:*:*:*:*:*:*

Configuration 59

AND

OR

cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218:-:*:*:*:*:*:*:*

Configuration 60

AND

OR

cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218b:-:*:*:*:*:*:*:*

Configuration 61

AND

OR

cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218n:-:*:*:*:*:*:*:*

Configuration 62

AND

OR

cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5218t:-:*:*:*:*:*:*:*

Configuration 63

AND

OR

cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220:-:*:*:*:*:*:*:*

Configuration 64

AND

OR

cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220r:-:*:*:*:*:*:*:*

Configuration 65

AND

OR

cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220s:-:*:*:*:*:*:*:*

Configuration 66

AND

OR

cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5220t:-:*:*:*:*:*:*:*

Configuration 67

AND

OR

cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_5222:-:*:*:*:*:*:*:*

Configuration 68

AND

OR

cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6222v:-:*:*:*:*:*:*:*

Configuration 69

AND

OR

cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6226:-:*:*:*:*:*:*:*

Configuration 70

AND

OR

cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6230:-:*:*:*:*:*:*:*

Configuration 71

AND

OR

cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6230n:-:*:*:*:*:*:*:*

Configuration 72

AND

OR

cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6230t:-:*:*:*:*:*:*:*

Configuration 73

AND

OR

cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6234:-:*:*:*:*:*:*:*

Configuration 74

AND

OR

cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238:-:*:*:*:*:*:*:*

Configuration 75

AND

OR

cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238l:-:*:*:*:*:*:*:*

Configuration 76

AND

OR

cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238m:-:*:*:*:*:*:*:*

Configuration 77

AND

OR

cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6238t:-:*:*:*:*:*:*:*

Configuration 78

AND

OR

cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240:-:*:*:*:*:*:*:*

Configuration 79

AND

OR

cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240l:-:*:*:*:*:*:*:*

Configuration 80

AND

OR

cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240m:-:*:*:*:*:*:*:*

Configuration 81

AND

OR

cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6240y:-:*:*:*:*:*:*:*

Configuration 82

AND

OR

cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6242:-:*:*:*:*:*:*:*

Configuration 83

AND

OR

cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6244:-:*:*:*:*:*:*:*

Configuration 84

AND

OR

cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6246:-:*:*:*:*:*:*:*

Configuration 85

AND

OR

cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6248:-:*:*:*:*:*:*:*

Configuration 86

AND

OR

cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6252:-:*:*:*:*:*:*:*

Configuration 87

AND

OR

cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6252n:-:*:*:*:*:*:*:*

Configuration 88

AND

OR

cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6254:-:*:*:*:*:*:*:*

Configuration 89

AND

OR

cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_6262v:-:*:*:*:*:*:*:*

Configuration 90

AND

OR

cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4208:-:*:*:*:*:*:*:*

Configuration 91

AND

OR

cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4208r:-:*:*:*:*:*:*:*

Configuration 92

AND

OR

cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4209t:-:*:*:*:*:*:*:*

Configuration 93

AND

OR

cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4210:-:*:*:*:*:*:*:*

Configuration 94

AND

OR

cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4210r:-:*:*:*:*:*:*:*

Configuration 95

AND

OR

cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214:-:*:*:*:*:*:*:*

Configuration 96

AND

OR

cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214c:-:*:*:*:*:*:*:*

Configuration 97

AND

OR

cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214r:-:*:*:*:*:*:*:*

Configuration 98

AND

OR

cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4214y:-:*:*:*:*:*:*:*

Configuration 99

AND

OR

cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4215:-:*:*:*:*:*:*:*

Configuration 100

AND

OR

cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4216:-:*:*:*:*:*:*:*

Configuration 101

AND

OR

cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_4216r:-:*:*:*:*:*:*:*

Configuration 102

AND

OR

cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_3204:-:*:*:*:*:*:*:*

Configuration 103

AND

OR

cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_3206r:-:*:*:*:*:*:*:*

Configuration 104

AND

OR

cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*

Configuration 105

AND

OR

cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*

Configuration 106

AND

OR

cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*

Configuration 107

AND

OR

cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*

Configuration 108

AND

OR

cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*

Configuration 109

AND

OR

cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*

Configuration 110

AND

OR

cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*

Configuration 111

AND

OR

cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*

Configuration 112

AND

OR

cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*

Configuration 113

AND

OR

cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*

Configuration 114

AND

OR

cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*

Configuration 115

AND

OR

cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*

Configuration 116

AND

OR

cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*

Configuration 117

AND

OR

cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*

Configuration 118

AND

OR

cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*

Configuration 119

AND

OR

cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*

Configuration 120

AND

OR

cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*

Configuration 121

AND

OR

cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*

Configuration 122

AND

OR

cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*

Configuration 123

AND

OR

cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*

Configuration 124

AND

OR

cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*

Configuration 125

AND

OR

cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*

Configuration 126

AND

OR

cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*

Configuration 127

AND

OR

cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*

Configuration 128

AND

OR

cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*

Configuration 129

AND

OR

cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*

Configuration 130

AND

OR

cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*

Configuration 131

AND

OR

cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*

Configuration 132

AND

OR

cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*

Configuration 133

AND

OR

cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*

Configuration 134

AND

OR

cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*

Configuration 135

AND

OR

cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*

Configuration 136

AND

OR

cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*

Configuration 137

AND

OR

cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*

Configuration 138

AND

OR

cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*

Configuration 139

AND

OR

cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*

Configuration 140

AND

OR

cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*

Configuration 141

AND

OR

cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*

Configuration 142

AND

OR

cpe:2.3:o:intel:pentium_6405u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*

Configuration 143

AND

OR

cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*

Configuration 144

AND

OR

cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*

Configuration 145

AND

OR

cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*

Configuration 146

AND

OR

cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*

Configuration 147

AND

OR

cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*

Configuration 148

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Tenable Plugins

View all (144 total)

IDNameProductFamilySeverity
150660SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2019:14217-1)NessusSuSE Local Security Checks
medium
150642SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2019:14220-1)NessusSuSE Local Security Checks
medium
150584SUSE SLES11 Security Update : xen (SUSE-SU-2020:14444-1)NessusSuSE Local Security Checks
critical
150533SUSE SLES11 Security Update : kernel (SUSE-SU-2019:14218-1)NessusSuSE Local Security Checks
critical
145983CentOS 8 : virt:rhel (CESA-2020:0279)NessusCentOS Local Security Checks
medium
140038Oracle Linux 8 : virt:ol (ELSA-2020-0279)NessusOracle Linux Local Security Checks
medium
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
138011EulerOS Virtualization 3.0.6.0 : kvm (EulerOS-SA-2020-1792)NessusHuawei Local Security Checks
high
138009EulerOS Virtualization 3.0.6.0 : qemu-kvm (EulerOS-SA-2020-1790)NessusHuawei Local Security Checks
critical
137739OracleVM 3.3 / 3.4 : microcode_ctl (OVMSA-2020-0026) (Spectre)NessusOracleVM Local Security Checks
medium
136239EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1536)NessusHuawei Local Security Checks
critical
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
135525EulerOS 2.0 SP3 : kernel (EulerOS-SA-2020-1396)NessusHuawei Local Security Checks
critical
135129EulerOS Virtualization for ARM 64 3.0.6.0 : kernel (EulerOS-SA-2020-1342)NessusHuawei Local Security Checks
critical
134964GLSA-202003-56 : Xen: Multiple vulnerabilities (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusGentoo Local Security Checks
critical
134648Scientific Linux Security Update : kernel on SL7.x x86_64 (20200317)NessusScientific Linux Local Security Checks
high
134344RHEL 7 : qemu-kvm-rhev (RHSA-2020:0730)NessusRed Hat Local Security Checks
critical
134312NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2020-0021)NessusNewStart CGSL Local Security Checks
high
134263RHEL 7 : qemu-kvm (RHSA-2020:0666)NessusRed Hat Local Security Checks
medium
134174Xen Information Disclosure Vulnerability (XSA-305)NessusMisc.
medium
133992EulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1158)NessusHuawei Local Security Checks
critical
133913EulerOS 2.0 SP5 : kernel (EulerOS-SA-2020-1112)NessusHuawei Local Security Checks
critical
133825RHEL 8 : virt:8.1 and virt-devel:8.1 (RHSA-2020:0555)NessusRed Hat Local Security Checks
medium
133763SUSE SLES12 Security Update : xen (SUSE-SU-2020:0388-1)NessusSuSE Local Security Checks
critical
133539SUSE SLES12 Security Update : xen (SUSE-SU-2020:0334-1)NessusSuSE Local Security Checks
critical
133518Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20200205)NessusScientific Linux Local Security Checks
high
133513Oracle Linux 7 : qemu-kvm (ELSA-2020-0366)NessusOracle Linux Local Security Checks
high
133507CentOS 7 : qemu-kvm (CESA-2020:0366)NessusCentOS Local Security Checks
high
133482RHEL 7 : qemu-kvm (RHSA-2020:0366)NessusRed Hat Local Security Checks
high
133338RHEL 8 : virt:rhel (RHSA-2020:0279)NessusRed Hat Local Security Checks
medium
133221RHEL 8 : kernel (RHSA-2020:0204)NessusRed Hat Local Security Checks
critical
133072NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2020-0002)NessusNewStart CGSL Local Security Checks
high
132925SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0093-1)NessusSuSE Local Security Checks
critical
132875Debian DSA-4602-1 : xen - security update (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusDebian Local Security Checks
critical
132687RHEL 7 : kpatch-patch (RHSA-2020:0028)NessusRed Hat Local Security Checks
medium
132685RHEL 7 : kpatch-patch (RHSA-2020:0026)NessusRed Hat Local Security Checks
medium
132536Photon OS 2.0: Linux PHSA-2019-2.0-0191NessusPhotonOS Local Security Checks
medium
132520Photon OS 1.0: Linux PHSA-2019-1.0-0259NessusPhotonOS Local Security Checks
medium
132516openSUSE Security Update : spectre-meltdown-checker (openSUSE-2019-2710)NessusSuSE Local Security Checks
medium
132513Debian DLA-2051-1 : intel-microcode security updateNessusDebian Local Security Checks
medium
132499NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0266)NessusNewStart CGSL Local Security Checks
high
132490NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0264)NessusNewStart CGSL Local Security Checks
high
132337SUSE SLED15 / SLES15 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3348-1)NessusSuSE Local Security Checks
medium
132334SUSE SLES12 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3340-1)NessusSuSE Local Security Checks
medium
132101Windows Speculative Execution Configuration CheckNessusWindows
medium
132073SUSE SLES12 Security Update : xen (SUSE-SU-2019:3297-1)NessusSuSE Local Security Checks
critical
132071SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:3295-1)NessusSuSE Local Security Checks
high
131833SUSE SLES12 Security Update : kernel (SUSE-SU-2019:3200-1)NessusSuSE Local Security Checks
high
131694Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : intel-microcode regression (USN-4182-3)NessusUbuntu Local Security Checks
medium
131552SUSE SLES12 Security Update : ucode-intel (SUSE-SU-2019:3091-1)NessusSuSE Local Security Checks
medium
131460Fedora 30 : xen (2019-cbb732f760)NessusFedora Local Security Checks
critical
131297FreeBSD : FreeBSD -- Intel CPU Microcode Update (fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Spectre)NessusFreeBSD Local Security Checks
critical
131272Oracle Linux 8 : kernel (ELSA-2019-3832)NessusOracle Linux Local Security Checks
medium
131227Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-089)NessusVirtuozzo Local Security Checks
high
131208OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0056)NessusOracleVM Local Security Checks
high
131177RHEL 8 : kpatch-patch (RHSA-2019:3936)NessusRed Hat Local Security Checks
medium
131174Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4850)NessusOracle Linux Local Security Checks
high
131156openSUSE Security Update : ucode-intel (openSUSE-2019-2528)NessusSuSE Local Security Checks
medium
131155openSUSE Security Update : ucode-intel (openSUSE-2019-2527)NessusSuSE Local Security Checks
medium
131143Fedora 31 : xen (2019-376ec5c107)NessusFedora Local Security Checks
critical
131129VMware Workstation 15.0.x < 15.5.1 Multiple Vulnerabilities (VMSA-2019-0020, VMSA-2019-0021)NessusWindows
critical
131128VMware Fusion 11.0.x < 11.5.1 Multiple Vulnerabilities (VMSA-2019-0020, VMSA-2019-0021)NessusMacOS X Local Security Checks
critical
131123SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2019:2988-1)NessusSuSE Local Security Checks
medium
131122SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2987-1)NessusSuSE Local Security Checks
medium
131121SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2986-1)NessusSuSE Local Security Checks
medium
131120SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2984-1)NessusSuSE Local Security Checks
critical
131114Slackware 14.2 : Slackware 14.2 kernel (SSA:2019-320-01)NessusSlackware Local Security Checks
high
131110Oracle Linux 7 : kernel (ELSA-2019-3834)NessusOracle Linux Local Security Checks
medium
131083Amazon Linux AMI : microcode_ctl / kernel (ALAS-2019-1318)NessusAmazon Linux Local Security Checks
medium
131082Amazon Linux 2 : microcode_ctl / kernel (ALAS-2019-1364)NessusAmazon Linux Local Security Checks
medium
131064openSUSE Security Update : qemu (openSUSE-2019-2510)NessusSuSE Local Security Checks
high
131063openSUSE Security Update : ucode-intel (openSUSE-2019-2509)NessusSuSE Local Security Checks
medium
131062openSUSE Security Update : xen (openSUSE-2019-2508)NessusSuSE Local Security Checks
critical
131061openSUSE Security Update : the Linux Kernel (openSUSE-2019-2507)NessusSuSE Local Security Checks
high
131060openSUSE Security Update : xen (openSUSE-2019-2506)NessusSuSE Local Security Checks
critical
131059openSUSE Security Update : qemu (openSUSE-2019-2505)NessusSuSE Local Security Checks
medium
131058openSUSE Security Update : ucode-intel (openSUSE-2019-2504)NessusSuSE Local Security Checks
medium
131057openSUSE Security Update : the Linux Kernel (openSUSE-2019-2503)NessusSuSE Local Security Checks
high
131032CentOS 7 : kernel (CESA-2019:3834)NessusCentOS Local Security Checks
medium
131018VMSA-2019-0020 : Hypervisor-Specific Mitigations for Denial-of-Service and Speculative-Execution VulnerabilitiesNessusVMware ESX Local Security Checks
medium
131014Ubuntu 16.04 LTS : Linux kernel vulnerability (USN-4186-3)NessusUbuntu Local Security Checks
high
131013Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerability and regression (USN-4185-3)NessusUbuntu Local Security Checks
high
131012Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerability and regression (USN-4184-2)NessusUbuntu Local Security Checks
high
131011Ubuntu 19.10 : Linux kernel vulnerability (USN-4183-2)NessusUbuntu Local Security Checks
high
131007Scientific Linux Security Update : kernel on SL7.x x86_64 (20191113)NessusScientific Linux Local Security Checks
medium
131006Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20191113)NessusScientific Linux Local Security Checks
medium
130999RHEL 7 : Virtualization Manager (RHSA-2019:3860)NessusRed Hat Local Security Checks
medium
130998RHEL 6 : MRG (RHSA-2019:3844)NessusRed Hat Local Security Checks
medium
130997Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4839)NessusOracle Linux Local Security Checks
medium
130996Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4838)NessusOracle Linux Local Security Checks
medium
130995Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4837)NessusOracle Linux Local Security Checks
medium
130994Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4836)NessusOracle Linux Local Security Checks
medium
130993Oracle Linux 6 : kernel (ELSA-2019-3836)NessusOracle Linux Local Security Checks
medium
130989Fedora 29 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-7a3fc17778)NessusFedora Local Security Checks
high
130983Debian DSA-4565-1 : intel-microcode - security updateNessusDebian Local Security Checks
medium
130982Debian DSA-4564-1 : linux - security updateNessusDebian Local Security Checks
high
130979Debian DLA-1990-1 : linux-4.9 security updateNessusDebian Local Security Checks
high
130978CentOS 6 : kernel (CESA-2019:3836)NessusCentOS Local Security Checks
medium
130966Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4186-1)NessusUbuntu Local Security Checks
high
130965Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4185-1)NessusUbuntu Local Security Checks
high
130964Ubuntu 18.04 LTS / 19.04 : Linux kernel vulnerabilities (USN-4184-1)NessusUbuntu Local Security Checks
high
130963Ubuntu 19.10 : Linux kernel vulnerabilities (USN-4183-1)NessusUbuntu Local Security Checks
high
130962Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : Intel Microcode update (USN-4182-1)NessusUbuntu Local Security Checks
medium
130960SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2019:2962-1)NessusSuSE Local Security Checks
critical
130959SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2019:2961-1)NessusSuSE Local Security Checks
critical
130958SUSE SLED15 / SLES15 Security Update : xen (SUSE-SU-2019:2960-1)NessusSuSE Local Security Checks
critical
130957SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2019:2959-1)NessusSuSE Local Security Checks
medium
130956SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2958-1)NessusSuSE Local Security Checks
medium
130955SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2019:2957-1)NessusSuSE Local Security Checks
medium
130954SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2019:2956-1)NessusSuSE Local Security Checks
medium
130953SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2019:2955-1)NessusSuSE Local Security Checks
high
130952SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2019:2954-1)NessusSuSE Local Security Checks
medium
130951SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2953-1)NessusSuSE Local Security Checks
high
130950SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic)NessusSuSE Local Security Checks
critical
130949SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2949-1)NessusSuSE Local Security Checks
critical
130948SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:2948-1)NessusSuSE Local Security Checks
high
130947SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2947-1)NessusSuSE Local Security Checks
high
130946SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2946-1)NessusSuSE Local Security Checks
high
130935RHEL 6 : kernel (RHSA-2019:3843)NessusRed Hat Local Security Checks
medium
130934RHEL 6 : kernel (RHSA-2019:3842)NessusRed Hat Local Security Checks
medium
130933RHEL 7 : kernel (RHSA-2019:3841)NessusRed Hat Local Security Checks
high
130932RHEL 7 : kernel (RHSA-2019:3840)NessusRed Hat Local Security Checks
medium
130931RHEL 7 : kernel (RHSA-2019:3839)NessusRed Hat Local Security Checks
medium
130930RHEL 7 : kernel (RHSA-2019:3838)NessusRed Hat Local Security Checks
medium
130929RHEL 7 : kernel (RHSA-2019:3837)NessusRed Hat Local Security Checks
medium
130928RHEL 6 : kernel (RHSA-2019:3836)NessusRed Hat Local Security Checks
medium
130927RHEL 7 : kernel-rt (RHSA-2019:3835)NessusRed Hat Local Security Checks
medium
130926RHEL 7 : kernel (RHSA-2019:3834)NessusRed Hat Local Security Checks
medium
130925RHEL 8 : kernel-rt (RHSA-2019:3833)NessusRed Hat Local Security Checks
medium
130924RHEL 8 : kernel (RHSA-2019:3832)NessusRed Hat Local Security Checks
medium
130923OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0052)NessusOracleVM Local Security Checks
medium
130920Fedora 31 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-68d7f68507)NessusFedora Local Security Checks
high
130919Fedora 30 : 2:microcode_ctl / kernel / kernel-headers / kernel-tools (2019-1689d3fe07)NessusFedora Local Security Checks
high
130918Debian DLA-1989-1 : linux security updateNessusDebian Local Security Checks
medium
130910KB4525253: Windows Server 2012 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130909KB4525250: Windows 8.1 and Windows Server 2012 R2 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130908KB4525241: Windows 10 Version 1709 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130907KB4525237: Windows 10 Version 1803 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130906KB4525236: Windows 10 Version 1607 and Windows Server 2016 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130905KB4525233: Windows 7 and Windows Server 2008 R2 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130904KB4525239: Windows Server 2008 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130903KB4525232: Windows 10 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130902KB4524570: Windows 10 Version 1903 and Windows 10 Version 1909 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
130901KB4523205: Windows 10 Version 1809 and Windows Server 2019 November 2019 Security UpdateNessusWindows : Microsoft Bulletins
high