ID

VAR-201905-0709


CVE

CVE-2018-12126


TITLE

Multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22231)

Trust: 0.6

sources: CNVD: CNVD-2019-22231

DESCRIPTION

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. (CVE-2019-11091) * QEMU: device_tree: heap buffer overflow while loading device tree blob (CVE-2018-20815) * QEMU: rtl8139: integer overflow leads to buffer overflow (CVE-2018-17958) * QEMU: net: ignore packets with large size (CVE-2018-17963) * QEMU: scsi-generic: possible OOB access while handling inquiry request (CVE-2019-6501) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section. Once all virtual machines have shut down, start them again for this update to take effect. Bugs fixed (https://bugzilla.redhat.com/): 1508708 - [data plane] Qemu-kvm core dumped when doing block-stream and block-job-cancel to a data disk with data-plane enabled 1526313 - Improve QEMU lock error info for hot-plugging same qcow2 image file twice in different target to VM 1531888 - Local VM and migrated VM on the same host can run with same RAW file as visual disk source while without shareable configured or lock manager enabled 1551486 - QEMU image locking needn't double open fd number (i.e. drop file-posix.c:s->lock_fd) 1585155 - QEMU core dumped when hotplug memory exceeding host hugepages and with discard-data=yes 1597482 - qemu crashed when disk enable the IOMMU 1598119 - "share-rw=on" does not work for luks format image 1603104 - Qemu Aborted (core dumped) for 'qemu-kvm: Failed to lock byte 100' when remote NFS or GlusterFS volume stopped during the block mirror(or block commit/stream) process 1607768 - qemu aborted when start guest with a big iothreads 1608226 - [virtual-network][mq] prompt warning "qemu-kvm: unable to start vhost net: 14: falling back on userspace virtio" when boot with win8+ guests with multi-queue 1610461 - High Host CPU load for Windows 10 Guests (Update 1803) when idle 1614302 - qemu-kvm: Could not find keytab file: /etc/qemu/krb5.tab: No such file or directory 1614610 - Guest quit with error when hotunplug cpu 1619778 - Ballooning is incompatible with vfio assigned devices, but not prevented 1620373 - Failed to do migration after hotplug and hotunplug the ivshmem device 1623986 - block-commit can't be used with -blockdev 1624009 - allow backing of pflash via -blockdev 1627272 - boot guest with q35+vIOMMU+ device assignment, qemu crash when return assigned network devices from vfio driver to ixgbe in guest 1628098 - [Intel 7.7 BUG][KVM][Crystal Ridge]object_get_canonical_path_component: assertion failed: (obj->parent != NULL) 1629056 - qemu NBD server failure with block status of dirty bitmaps 1629717 - qemu_ram_mmap: Assertion `is_power_of_2(align)' failed 1629720 - [Intel 7.6 BUG][Crystal Ridge] pc_dimm_get_free_addr: assertion failed: (QEMU_ALIGN_UP(address_space_start, align) == address_space_start) 1631052 - x-block-dirty-bitmap-merge into a disabled bitmap dest causes assert 1631227 - Qemu Core dump when quit vm that's in status "paused(io-error)" with data plane enabled 1631615 - Wrong werror default for -device drive=<node-name> 1631877 - qemu dirty bitmap merge fails to update count 1633150 - Cross migration from RHEL7.5 to RHEL7.6 fails with cpu flag stibp 1633536 - Qemu core dump when do migration after hot plugging a backend image with 'blockdev-add'(without the frontend) 1636712 - CVE-2018-17958 QEMU: rtl8139: integer overflow leads to buffer overflow 1636777 - CVE-2018-17963 QEMU: net: ignore packets with large size 1642551 - qemu-kvm-tools-rhev depends on libxkbcommon, but the RPM-level dependency is missing 1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) 1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) 1648236 - QEMU doesn't expose rendernode option for egl-headless display type 1656913 - qcow2 cache is too small 1666336 - severe performance impact using encrypted Cinder volume (QEMU luks) 1666884 - persistent bitmaps prevent qcow2 image resize 1667320 - -blockdev: auto-read-only is ineffective for drivers on read-only whitelist 1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) 1668160 - CVE-2019-6501 QEMU: scsi-generic: possible OOB access while handling inquiry request 1668956 - incremental backup bitmap API needs a finalized interface 1672010 - [RHEL7]Qemu coredump when remove a persistent bitmap after vm re-start(dataplane enabled) 1673080 - "An unknown error has occurred" when using cdrom to install the system with two blockdev disks.(when choose installation destination) 1673397 - [RHEL.7] qemu-kvm core dumped after hotplug the deleted disk with iothread parameter 1673402 - Qemu core dump when start guest with two disks using same drive 1676728 - RHEL77: Run iotests as part of build process 1677073 - Backport additional QEMU 4.0 Bitmap API changes to RHEL 7.7 1678515 - CVE-2019-9824 QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables 1685989 - Add facility to use block jobs with backing images without write permission 1691009 - NBD pull mode incremental backup API needs a finalized interface 1691018 - Fix iotest 226 for local development builds 1691048 - Add qemu-img info support for querying bitmaps offline 1691563 - QEMU NBD Feature parity roundup (QEMU 3.1.0) 1692018 - qemu-img: Protocol error: simple reply when structured reply chunk was expected 1693101 - CVE-2018-20815 QEMU: device_tree: heap buffer overflow while loading device tree blob 1703916 - Qemu core dump when quit vm after forbidden to do backup with a read-only bitmap 1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) 1714160 - Guest with 'reservations' for a disk start failed 6. (CVE-2019-11091) 4. This update provides additional support for some Sandybridge server and Core-X CPUs which were not covered in the original May microcode release. For a list of specific CPU models now supported please refer to the entries listed under CPUID 206D6 and 206D7 at https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf For the stable distribution (stretch), these problems have been fixed in version 3.20190618.1~deb9u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl0LKeoACgkQEMKTtsN8 TjZNtxAAi0dfmsv3xJXYXa/UIG7ayCCdywg7bfYUIFh7eaz5K9IUdq1RRea+qPsd BKzBaWDDGl6+YyZJibFD+JYjrxvHOEWtVrJPuoco2Z34nKkEJDieoFtQjjeZ61ik S9iT2zWnTQa+VixIdJuYBS9z1Rakf58SU/IpNKxZ33eaJ+isAe9KQLO0OyD/d9qN x56EQyAmSOx44IrzkHegIchFNaV2fvScoJ1kVg21FMKWi96P4GTU7jw2UWzNepVs 6yrXfTSaPWUbSg93D24i0FXVce9m35OP7SosdkIyDU5fRfHGxTPxDFnXa2PmY71j uBniE6oUe75Fh9tZpNCQoL9e08463pZjjETcTBxMKYF+Q9/3OwIeRfYCd39gLlsP H3GNW8bLzxrntWquRazthkvfkTP+H9QG7E3ibeR/YX7l2aS5p8e6fs2OP57g3NCI ZJPrhrPstYJ6NhESUVi2N/QAiaOj4pBsel8bvIKyanGvWcNkonM5FV4tjfXm0GHx ZfIiBANF5aLh/pAkd5uDzxyH5xKhM/F0FRlDyqHjb2BuyoG3B2GLe2lXgkIhAR20 JmbPk9S/d15GNC9ndr+XFOkU6+IDgC7glSf0PLuRli7db6u6US1Ch+cS4k5mTzWS 7/Run+QoeSzZjIBvF6aamMZfWxISOHyvV+5b/cWGbfX4wqyppHQ= =VGab -----END PGP SIGNATURE----- . Bug Fix(es): * update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1692711) 4. 7.5) - ppc64, ppc64le, s390x, x86_64 3. Description: The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2019:1168-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1168 Issue date: 2019-05-14 CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2019-11091) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) 1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) 1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) 1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-957.12.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-957.12.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-957.12.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm ppc64: kernel-3.10.0-957.12.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.12.2.el7.ppc64.rpm kernel-debug-3.10.0-957.12.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.12.2.el7.ppc64.rpm kernel-devel-3.10.0-957.12.2.el7.ppc64.rpm kernel-headers-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.ppc64.rpm perf-3.10.0-957.12.2.el7.ppc64.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm python-perf-3.10.0-957.12.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-957.12.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debug-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.12.2.el7.ppc64le.rpm kernel-devel-3.10.0-957.12.2.el7.ppc64le.rpm kernel-headers-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.12.2.el7.ppc64le.rpm perf-3.10.0-957.12.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm python-perf-3.10.0-957.12.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm s390x: kernel-3.10.0-957.12.2.el7.s390x.rpm kernel-debug-3.10.0-957.12.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.s390x.rpm kernel-debug-devel-3.10.0-957.12.2.el7.s390x.rpm kernel-debuginfo-3.10.0-957.12.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.12.2.el7.s390x.rpm kernel-devel-3.10.0-957.12.2.el7.s390x.rpm kernel-headers-3.10.0-957.12.2.el7.s390x.rpm kernel-kdump-3.10.0-957.12.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.12.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.12.2.el7.s390x.rpm perf-3.10.0-957.12.2.el7.s390x.rpm perf-debuginfo-3.10.0-957.12.2.el7.s390x.rpm python-perf-3.10.0-957.12.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.s390x.rpm x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.ppc64.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-957.12.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm kernel-doc-3.10.0-957.12.2.el7.noarch.rpm x86_64: bpftool-3.10.0-957.12.2.el7.x86_64.rpm kernel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm perf-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.12.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-12126 https://access.redhat.com/security/cve/CVE-2018-12127 https://access.redhat.com/security/cve/CVE-2018-12130 https://access.redhat.com/security/cve/CVE-2019-11091 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/mds 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXNsSddzjgjWX9erEAQiDGRAAo9mifOQBxfgWFR3QSCU6uLW6taihgkQ+ E9S9uNH1yymcF7UoAetYY9RhBPF/dczLoLxhUFeWDZxrsAW0QDuW/lHWwewnk1Cp XjYSj6wMCJqFCzt1g4q8LXzrY0mrKoOZQTuB13rV6wYB0FVAySKUr6pGDUfsmVoD X7Cbwr7dizJqIT6I0Fj9//OlRciyi5Wls5R8r1P9tbznAR1621uuUY5+fsDIkJwz usZmx6HT/a/P4L2AqMUH7iBi159uYg99HdlEFhT94NF1DOHfn15wMiuQidA+b1iy 9y8EJkLvkI6Oyiae7Aq+lsehk1wtZH4D/Fyqy/uPsJEbIdKoa3C4oIMvIaFvczCE INLrNjz5NxJxI8yVF6Hd4P6yy11BO4LvkDWYfAEzLobaAgmXz+ZRT1PjV1hts+kC Y4AzB+ihaNpG4gCj5SES0xYOuwUlva9QWlTGpau2qFCAwgzT9JylYYN7oBnr9VBc 3bSc6uTVQW5TAIoKpIAt6XLeQa4cFhI47HA5iyzoIJKnbxfmh0EWGBYiVhuXINcl wIggLiY8VRr0ZlFykx3XHXHM2Wa4iMS5E48QpL10l1rm93dtumjTIFUdG8eJEgGI 4hUX7anY9A8IyMSPK4McQt19BzAfcWPuKziAcful7jBLtPvhhCRfNjgo9+x+QwK4 ub8jpANp7mM= =Ik8D -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements

Trust: 2.43

sources: NVD: CVE-2018-12126 // CNVD: CNVD-2019-22231 // VULHUB: VHN-122054 // PACKETSTORM: 152911 // PACKETSTORM: 152904 // PACKETSTORM: 154188 // PACKETSTORM: 152899 // PACKETSTORM: 153379 // PACKETSTORM: 152897 // PACKETSTORM: 152889 // PACKETSTORM: 152894 // PACKETSTORM: 152884 // PACKETSTORM: 152876

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-22231

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:29

Trust: 1.0

vendor:intelmodel:microarchitectural store buffer data samplingscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon scalable processorsscope: - version: -

Trust: 0.6

vendor:intelmodel:6th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:5th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:8th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:7th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v60

Trust: 0.6

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v40

Trust: 0.6

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v40

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v4

Trust: 0.6

sources: CNVD: CNVD-2019-22231 // NVD: CVE-2018-12126

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-12126
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2019-22231
value: MEDIUM

Trust: 0.6

VULHUB: VHN-122054
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-12126
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2019-22231
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-122054
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-12126
baseSeverity: MEDIUM
baseScore: 5.6
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.1
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2019-22231 // VULHUB: VHN-122054 // NVD: CVE-2018-12126

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-122054 // NVD: CVE-2018-12126

TYPE

overflow

Trust: 0.2

sources: PACKETSTORM: 154188 // PACKETSTORM: 152897

PATCH

title:Patches for multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22231)url:https://www.cnvd.org.cn/patchInfo/show/168513

Trust: 0.6

sources: CNVD: CNVD-2019-22231

EXTERNAL IDS

db:NVDid:CVE-2018-12126

Trust: 2.7

db:PACKETSTORMid:155281

Trust: 1.1

db:MCAFEEid:SB10292

Trust: 1.1

db:SIEMENSid:SSA-616472

Trust: 1.1

db:SIEMENSid:SSA-608355

Trust: 1.1

db:CNVDid:CNVD-2019-22231

Trust: 0.6

db:PACKETSTORMid:152899

Trust: 0.2

db:PACKETSTORMid:152911

Trust: 0.2

db:PACKETSTORMid:152904

Trust: 0.2

db:PACKETSTORMid:152884

Trust: 0.2

db:PACKETSTORMid:154188

Trust: 0.2

db:PACKETSTORMid:152894

Trust: 0.2

db:PACKETSTORMid:152889

Trust: 0.2

db:PACKETSTORMid:152876

Trust: 0.2

db:PACKETSTORMid:153379

Trust: 0.2

db:PACKETSTORMid:152939

Trust: 0.1

db:PACKETSTORMid:152902

Trust: 0.1

db:PACKETSTORMid:152908

Trust: 0.1

db:PACKETSTORMid:152891

Trust: 0.1

db:PACKETSTORMid:152907

Trust: 0.1

db:PACKETSTORMid:152938

Trust: 0.1

db:PACKETSTORMid:152919

Trust: 0.1

db:PACKETSTORMid:152903

Trust: 0.1

db:PACKETSTORMid:153389

Trust: 0.1

db:PACKETSTORMid:155956

Trust: 0.1

db:PACKETSTORMid:152936

Trust: 0.1

db:PACKETSTORMid:152922

Trust: 0.1

db:PACKETSTORMid:152900

Trust: 0.1

db:PACKETSTORMid:152886

Trust: 0.1

db:PACKETSTORMid:152896

Trust: 0.1

db:PACKETSTORMid:152885

Trust: 0.1

db:PACKETSTORMid:152882

Trust: 0.1

db:PACKETSTORMid:152952

Trust: 0.1

db:PACKETSTORMid:152924

Trust: 0.1

db:PACKETSTORMid:152905

Trust: 0.1

db:PACKETSTORMid:152916

Trust: 0.1

db:PACKETSTORMid:152875

Trust: 0.1

db:PACKETSTORMid:152878

Trust: 0.1

db:PACKETSTORMid:152898

Trust: 0.1

db:PACKETSTORMid:152913

Trust: 0.1

db:PACKETSTORMid:152874

Trust: 0.1

db:PACKETSTORMid:152931

Trust: 0.1

db:PACKETSTORMid:152918

Trust: 0.1

db:PACKETSTORMid:152895

Trust: 0.1

db:PACKETSTORMid:156920

Trust: 0.1

db:PACKETSTORMid:152962

Trust: 0.1

db:PACKETSTORMid:152892

Trust: 0.1

db:PACKETSTORMid:153248

Trust: 0.1

db:PACKETSTORMid:152927

Trust: 0.1

db:PACKETSTORMid:152890

Trust: 0.1

db:PACKETSTORMid:152932

Trust: 0.1

db:PACKETSTORMid:152925

Trust: 0.1

db:PACKETSTORMid:152888

Trust: 0.1

db:PACKETSTORMid:152920

Trust: 0.1

db:PACKETSTORMid:152901

Trust: 0.1

db:PACKETSTORMid:152942

Trust: 0.1

db:PACKETSTORMid:152923

Trust: 0.1

db:PACKETSTORMid:152926

Trust: 0.1

db:PACKETSTORMid:152879

Trust: 0.1

db:PACKETSTORMid:152937

Trust: 0.1

db:PACKETSTORMid:152887

Trust: 0.1

db:PACKETSTORMid:152929

Trust: 0.1

db:PACKETSTORMid:152921

Trust: 0.1

db:PACKETSTORMid:152880

Trust: 0.1

db:PACKETSTORMid:152935

Trust: 0.1

db:PACKETSTORMid:152906

Trust: 0.1

db:PACKETSTORMid:152881

Trust: 0.1

db:PACKETSTORMid:152893

Trust: 0.1

db:PACKETSTORMid:153049

Trust: 0.1

db:PACKETSTORMid:152917

Trust: 0.1

db:CNNVDid:CNNVD-201905-621

Trust: 0.1

db:VULHUBid:VHN-122054

Trust: 0.1

db:PACKETSTORMid:152897

Trust: 0.1

sources: CNVD: CNVD-2019-22231 // VULHUB: VHN-122054 // PACKETSTORM: 152911 // PACKETSTORM: 152904 // PACKETSTORM: 154188 // PACKETSTORM: 152899 // PACKETSTORM: 153379 // PACKETSTORM: 152897 // PACKETSTORM: 152889 // PACKETSTORM: 152894 // PACKETSTORM: 152884 // PACKETSTORM: 152876 // NVD: CVE-2018-12126

REFERENCES

url:https://access.redhat.com/errata/rhsa-2019:2553

Trust: 1.2

url:https://seclists.org/bugtraq/2019/jun/28

Trust: 1.1

url:https://seclists.org/bugtraq/2019/jun/36

Trust: 1.1

url:https://seclists.org/bugtraq/2019/nov/16

Trust: 1.1

url:https://seclists.org/bugtraq/2019/nov/15

Trust: 1.1

url:https://seclists.org/bugtraq/2020/jan/21

Trust: 1.1

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt

Trust: 1.1

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html

Trust: 1.1

url:https://www.synology.com/security/advisory/synology_sa_19_24

Trust: 1.1

url:https://www.debian.org/security/2020/dsa-4602

Trust: 1.1

url:https://www.freebsd.org/security/advisories/freebsd-sa-19:07.mds.asc

Trust: 1.1

url:https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc

Trust: 1.1

url:https://security.gentoo.org/glsa/202003-56

Trust: 1.1

url:http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1455

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html

Trust: 1.1

url:https://usn.ubuntu.com/3977-3/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12126

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-11091

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-12127

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-12130

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10292

Trust: 1.0

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2019-11091

Trust: 0.9

url:https://access.redhat.com/security/vulnerabilities/mds

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2018-12127

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://access.redhat.com/security/team/key/

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2018-12130

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2018-12126

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.9

url:https://access.redhat.com/articles/11258

Trust: 0.8

url:https://usn.ubuntu.com/3977-1/

Trust: 0.6

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10292

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1187

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20815

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-17963

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-17958

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-17963

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-17958

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6501

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9824

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1200

Trust: 0.1

url:https://security-tracker.debian.org/tracker/intel-microcode

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/sa00233-microcode-update-guidance_05132019.pdf

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13215

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-11600

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7913

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7913

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-17558

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-13215

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-8633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17558

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11600

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8633

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-3665

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-16939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12190

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1182

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1196

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1168

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1174

Trust: 0.1

sources: CNVD: CNVD-2019-22231 // VULHUB: VHN-122054 // PACKETSTORM: 152911 // PACKETSTORM: 152904 // PACKETSTORM: 154188 // PACKETSTORM: 152899 // PACKETSTORM: 153379 // PACKETSTORM: 152897 // PACKETSTORM: 152889 // PACKETSTORM: 152894 // PACKETSTORM: 152884 // PACKETSTORM: 152876 // NVD: CVE-2018-12126

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 152911 // PACKETSTORM: 152904 // PACKETSTORM: 154188 // PACKETSTORM: 152899 // PACKETSTORM: 152897 // PACKETSTORM: 152889 // PACKETSTORM: 152894 // PACKETSTORM: 152884 // PACKETSTORM: 152876

SOURCES

db:CNVDid:CNVD-2019-22231
db:VULHUBid:VHN-122054
db:PACKETSTORMid:152911
db:PACKETSTORMid:152904
db:PACKETSTORMid:154188
db:PACKETSTORMid:152899
db:PACKETSTORMid:153379
db:PACKETSTORMid:152897
db:PACKETSTORMid:152889
db:PACKETSTORMid:152894
db:PACKETSTORMid:152884
db:PACKETSTORMid:152876
db:NVDid:CVE-2018-12126

LAST UPDATE DATE

2025-11-28T19:56:17.644000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-22231date:2019-07-12T00:00:00
db:VULHUBid:VHN-122054date:2019-06-11T00:00:00
db:NVDid:CVE-2018-12126date:2024-11-21T03:44:38.583

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-22231date:2019-07-12T00:00:00
db:VULHUBid:VHN-122054date:2019-05-30T00:00:00
db:PACKETSTORMid:152911date:2019-05-15T15:29:05
db:PACKETSTORMid:152904date:2019-05-15T15:23:42
db:PACKETSTORMid:154188date:2019-08-22T20:20:17
db:PACKETSTORMid:152899date:2019-05-15T15:22:20
db:PACKETSTORMid:153379date:2019-06-21T19:32:22
db:PACKETSTORMid:152897date:2019-05-15T15:21:46
db:PACKETSTORMid:152889date:2019-05-15T15:19:28
db:PACKETSTORMid:152894date:2019-05-15T15:20:58
db:PACKETSTORMid:152884date:2019-05-15T15:07:16
db:PACKETSTORMid:152876date:2019-05-15T14:57:41
db:NVDid:CVE-2018-12126date:2019-05-30T16:29:00.870