LOW
Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
https://usn.ubuntu.com/4253-1/
https://usn.ubuntu.com/4253-2/
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4255-1/
https://usn.ubuntu.com/4255-2/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
Source: MITRE
Published: 2020-01-17
Updated: 2020-02-20
Type: CWE-200
Base Score: 1.9
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 3.4
Severity: LOW
Base Score: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 1.8
Severity: MEDIUM
OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
OR
cpe:2.3:h:intel:atom_e3805:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e3815:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e3825:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e3826:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e3827:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e3845:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e620t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e640:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e640t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e660:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e660t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e680:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e680t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3-c3130:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3-c3200rk:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3-c3230rk:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3-c3405:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3-c3445:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-z8300:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-z8330:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-z8500:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x7-z8700:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2420:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2460:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2480:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2520:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2560:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2580:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z2760:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3460:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3480:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3530:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3560:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3570:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3580:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3590:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3735d:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3735e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3735f:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3735g:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3736f:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3736g:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3740:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3740d:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3745:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3745d:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3770:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3770d:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3775:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3775d:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3785:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z3795:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
138272 | SUSE SLES15 Security Update : kernel (SUSE-SU-2020:1663-1) | Nessus | SuSE Local Security Checks | critical |
136782 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1275-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) | Nessus | SuSE Local Security Checks | critical |
136661 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:1255-1) | Nessus | SuSE Local Security Checks | critical |
134971 | Slackware 14.2 : Slackware 14.2 kernel (SSA:2020-086-01) | Nessus | Slackware Local Security Checks | critical |
134954 | macOS 10.15.x < 10.15.4 / 10.14.x < 10.14.6 Security Update 2020-002 / 10.13.x < 10.13.6 Security Update 2020-002 | Nessus | MacOS X Local Security Checks | high |
134799 | EulerOS 2.0 SP5 : kernel (EulerOS-SA-2020-1308) | Nessus | Huawei Local Security Checks | high |
134660 | Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4302-1) | Nessus | Ubuntu Local Security Checks | low |
134645 | Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5569) | Nessus | Oracle Linux Local Security Checks | critical |
134559 | openSUSE Security Update : the Linux Kernel (openSUSE-2020-336) | Nessus | SuSE Local Security Checks | critical |
134363 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:0613-1) | Nessus | SuSE Local Security Checks | critical |
134293 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0584-1) | Nessus | SuSE Local Security Checks | critical |
134292 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0580-1) | Nessus | SuSE Local Security Checks | critical |
134289 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:0560-1) | Nessus | SuSE Local Security Checks | critical |
134288 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0559-1) | Nessus | SuSE Local Security Checks | critical |
134287 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0558-1) | Nessus | SuSE Local Security Checks | critical |
134240 | Debian DLA-2114-1 : linux-4.9 security update | Nessus | Debian Local Security Checks | critical |
133800 | Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4287-1) | Nessus | Ubuntu Local Security Checks | medium |
133799 | Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4286-1) | Nessus | Ubuntu Local Security Checks | low |
133798 | Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-4285-1) | Nessus | Ubuntu Local Security Checks | medium |
133797 | Ubuntu 18.04 LTS / 19.10 : Linux kernel vulnerabilities (USN-4284-1) | Nessus | Ubuntu Local Security Checks | medium |
133351 | Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-4255-2) | Nessus | Ubuntu Local Security Checks | medium |
133350 | Ubuntu 18.04 LTS : Linux kernel (HWE) vulnerability (USN-4253-2) | Nessus | Ubuntu Local Security Checks | low |
133294 | Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-4255-1) | Nessus | Ubuntu Local Security Checks | medium |
133293 | Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4254-1) | Nessus | Ubuntu Local Security Checks | medium |
133292 | Ubuntu 19.10 : Linux kernel vulnerability (USN-4253-1) | Nessus | Ubuntu Local Security Checks | low |
132943 | FreeBSD : drm graphics drivers -- potential information disclusure via local access (d2c2c815-3793-11ea-8be3-54e1ad3d6335) | Nessus | FreeBSD Local Security Checks | low |