ID

VAR-202203-0045


CVE

CVE-2022-0001


TITLE

Linux kernel on Intel systems is susceptible to Spectre v2 attacks

Trust: 0.8

sources: CERT/CC: VU#155143

DESCRIPTION

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. A new cross-privilege Spectre v2 vulnerability that impacts modern CPU architectures supporting speculative execution has been discovered. CPU hardware utilizing speculative execution that are vulnerable to Spectre v2 branch history injection (BHI) are likely affected. An unauthenticated attacker can exploit this vulnerability to leak privileged memory from the CPU by speculatively jumping to a chosen gadget. Current research shows that existing mitigation techniques of disabling privileged eBPF and enabling (Fine)IBT are insufficient in stopping BHI exploitation against the kernel/hypervisor.CVE-2022-0001 Not Affected CVE-2024-2201 AffectedCVE-2022-0001 Not Affected CVE-2024-2201 Affected. A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged malicious user to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes. ========================================================================= Ubuntu Security Notice USN-5362-1 April 01, 2022 linux-intel-5.13 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-intel-5.13: Linux kernel for Intel IOTG Details: Nick Gregory discovered that the Linux kernel incorrectly handled network offload functionality. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-25636) Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida discovered that hardware mitigations added by ARM to their processors to address Spectre-BTI were insufficient. A local attacker could potentially use this to expose sensitive information. (CVE-2022-23960) It was discovered that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-23222) Max Kellermann discovered that the Linux kernel incorrectly handled Unix pipes. A local attacker could potentially use this to modify any file that could be opened for reading. (CVE-2022-0847) Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492) William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-0185) Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida discovered that hardware mitigations added by Intel to their processors to address Spectre-BTI were insufficient. A local attacker could potentially use this to expose sensitive information. (CVE-2022-0001) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) It was discovered that the NFS server implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4090) Kirill Tkhai discovered that the XFS file system implementation in the Linux kernel did not calculate size correctly when pre-allocating space in some situations. A local attacker could use this to expose sensitive information. (CVE-2021-4155) It was discovered that the AMD Radeon GPU driver in the Linux kernel did not properly validate writes in the debugfs file system. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-42327) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) Samuel Page discovered that the Transparent Inter-Process Communication (TIPC) protocol implementation in the Linux kernel contained a stack-based buffer overflow. A remote attacker could use this to cause a denial of service (system crash) for systems that have a TIPC bearer configured. (CVE-2022-0435) It was discovered that the KVM implementation for s390 systems in the Linux kernel did not properly prevent memory operations on PVM guests that were in non-protected mode. A local attacker could use this to obtain unauthorized memory write access. (CVE-2022-0516) It was discovered that the ICMPv6 implementation in the Linux kernel did not properly deallocate memory in certain situations. A remote attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-0742) It was discovered that the VMware Virtual GPU driver in the Linux kernel did not properly handle certain failure conditions, leading to a stale entry in the file descriptor table. A local attacker could use this to expose sensitive information or possibly gain administrative privileges. (CVE-2022-22942) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.13.0-1010-intel 5.13.0-1010.10 linux-image-intel 5.13.0.1010.11 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5362-1 CVE-2021-4083, CVE-2021-4090, CVE-2021-4155, CVE-2021-42327, CVE-2022-0001, CVE-2022-0185, CVE-2022-0330, CVE-2022-0435, CVE-2022-0492, CVE-2022-0516, CVE-2022-0742, CVE-2022-0847, CVE-2022-22942, CVE-2022-23222, CVE-2022-23960, CVE-2022-25636 Package Information: https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10 . This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - Core kernel; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Android drivers; - Power management core; - Bus devices; - Hardware random number generator core; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - Device frequency scaling framework; - DMA engine subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - IIO ADC drivers; - IIO subsystem; - IIO Magnetometer sensors drivers; - InfiniBand drivers; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - PCI driver for MicroSemi Switchtec; - PHY drivers; - MediaTek PM domains; - Power supply drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - USB subsystem; - DesignWare USB3 driver; - Framebuffer layer; - AFS file system; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system client; - NILFS2 file system; - NTFS3 file system; - Pstore file system; - Diskquota system; - SMB network file system; - BPF subsystem; - Memory management; - Netfilter; - TLS protocol; - io_uring subsystem; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - L2TP protocol; - Logical Link layer; - MAC80211 subsystem; - Multipath TCP; - Netlink; - NET/ROM layer; - NFC subsystem; - Packet sockets; - RDS protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Tomoyo security module; - Realtek audio codecs; - USB sound devices; (CVE-2024-26910, CVE-2024-27074, CVE-2023-52494, CVE-2023-52594, CVE-2024-26915, CVE-2024-26766, CVE-2023-52489, CVE-2024-35845, CVE-2024-26846, CVE-2024-26898, CVE-2024-26897, CVE-2024-26826, CVE-2024-26798, CVE-2023-52662, CVE-2024-26856, CVE-2023-52608, CVE-2024-26782, CVE-2024-27047, CVE-2024-27390, CVE-2024-26610, CVE-2024-26804, CVE-2023-52638, CVE-2024-26771, CVE-2024-26752, CVE-2024-26585, CVE-2024-26645, CVE-2024-26715, CVE-2024-27028, CVE-2024-26809, CVE-2024-26880, CVE-2024-27432, CVE-2024-27065, CVE-2024-26717, CVE-2023-52616, CVE-2024-26748, CVE-2024-26795, CVE-2024-26671, CVE-2024-26743, CVE-2024-27412, CVE-2024-26802, CVE-2024-26733, CVE-2024-26736, CVE-2023-52618, CVE-2024-27046, CVE-2024-26688, CVE-2024-26679, CVE-2024-26769, CVE-2024-27051, CVE-2024-26603, CVE-2024-26744, CVE-2023-52434, CVE-2024-26697, CVE-2024-27075, CVE-2023-52583, CVE-2024-26583, CVE-2024-27403, CVE-2024-26907, CVE-2024-26636, CVE-2024-27410, CVE-2023-52530, CVE-2024-26840, CVE-2024-26851, CVE-2024-26862, CVE-2023-52640, CVE-2024-35829, CVE-2024-26906, CVE-2024-26777, CVE-2024-27419, CVE-2024-26664, CVE-2024-26627, CVE-2024-26859, CVE-2023-52486, CVE-2023-52652, CVE-2024-26835, CVE-2024-35844, CVE-2024-26702, CVE-2024-26635, CVE-2024-26704, CVE-2023-52633, CVE-2024-26816, CVE-2024-26894, CVE-2024-26778, CVE-2023-52599, CVE-2024-35828, CVE-2024-26776, CVE-2023-52493, CVE-2024-26845, CVE-2024-26594, CVE-2024-26885, CVE-2024-26829, CVE-2023-52645, CVE-2024-26695, CVE-2023-52615, CVE-2024-26651, CVE-2024-26843, CVE-2023-52606, CVE-2024-26675, CVE-2024-26874, CVE-2024-26883, CVE-2024-26772, CVE-2024-26673, CVE-2024-26737, CVE-2023-52631, CVE-2024-26640, CVE-2023-52598, CVE-2024-26735, CVE-2024-26895, CVE-2024-26592, CVE-2023-52492, CVE-2024-26861, CVE-2023-52644, CVE-2024-26920, CVE-2024-26877, CVE-2024-26863, CVE-2024-26720, CVE-2024-26722, CVE-2024-27045, CVE-2024-27038, CVE-2024-26763, CVE-2024-26833, CVE-2024-27417, CVE-2024-26916, CVE-2024-26857, CVE-2024-26875, CVE-2024-26606, CVE-2024-27024, CVE-2024-26615, CVE-2023-52614, CVE-2023-52641, CVE-2024-26600, CVE-2024-27043, CVE-2023-52635, CVE-2024-26787, CVE-2024-26622, CVE-2024-27413, CVE-2024-26791, CVE-2023-52622, CVE-2023-52491, CVE-2023-52604, CVE-2024-27037, CVE-2024-26881, CVE-2024-26754, CVE-2024-26659, CVE-2024-26663, CVE-2024-26747, CVE-2023-52602, CVE-2024-26712, CVE-2024-26839, CVE-2024-26749, CVE-2024-26764, CVE-2024-26820, CVE-2024-26882, CVE-2024-27039, CVE-2024-27078, CVE-2024-26889, CVE-2024-26870, CVE-2024-26788, CVE-2024-26602, CVE-2024-26903, CVE-2024-27044, CVE-2024-27073, CVE-2023-52601, CVE-2023-52595, CVE-2024-26707, CVE-2024-27415, CVE-2023-52637, CVE-2024-26660, CVE-2024-27414, CVE-2024-27054, CVE-2023-52497, CVE-2024-26801, CVE-2023-52435, CVE-2023-52620, CVE-2023-52627, CVE-2024-26698, CVE-2023-52597, CVE-2024-27077, CVE-2023-52650, CVE-2024-26750, CVE-2024-26852, CVE-2024-27053, CVE-2023-52656, CVE-2024-26625, CVE-2024-26779, CVE-2024-27431, CVE-2024-26751, CVE-2024-26684, CVE-2024-26803, CVE-2024-26593, CVE-2023-52642, CVE-2023-52447, CVE-2024-26790, CVE-2024-26825, CVE-2024-26668, CVE-2023-52607, CVE-2024-26872, CVE-2024-27030, CVE-2023-52643, CVE-2024-26901, CVE-2024-35830, CVE-2024-26855, CVE-2023-52588, CVE-2023-52587, CVE-2024-26891, CVE-2024-26644, CVE-2024-26884, CVE-2024-26793, CVE-2024-26805, CVE-2024-26584, CVE-2024-27405, CVE-2023-52623, CVE-2024-26608, CVE-2024-26878, CVE-2024-27388, CVE-2024-27416, CVE-2024-26685, CVE-2024-27034, CVE-2024-26879, CVE-2024-26614, CVE-2024-26792, CVE-2023-52617, CVE-2024-26773, CVE-2024-26665, CVE-2024-26641, CVE-2023-52619, CVE-2024-35811, CVE-2024-27052, CVE-2024-27076, CVE-2024-26838, CVE-2024-26808, CVE-2024-26696, CVE-2024-26676, CVE-2024-26689, CVE-2024-26774, CVE-2024-26601, CVE-2023-52498, CVE-2024-27436) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS linux-image-5.15.0-1058-intel-iotg 5.15.0-1058.64~20.04.1 linux-image-intel 5.15.0.1058.64~20.04.1 linux-image-intel-iotg 5.15.0.1058.64~20.04.1 After a standard system update you need to reboot your computer to make all the necessary changes

Trust: 2.34

sources: NVD: CVE-2022-0001 // CERT/CC: VU#155143 // VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // PACKETSTORM: 166569 // PACKETSTORM: 178614 // PACKETSTORM: 179061 // PACKETSTORM: 179349 // PACKETSTORM: 179375 // PACKETSTORM: 179497

AFFECTED PRODUCTS

vendor:intelmodel:core i3-11100hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10610uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9222scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n6211scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1165g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6605scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10870hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1240pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6427fescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6222vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12450hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-l16g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5942bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n5100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6328hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2265scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1250pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon bronze 3204scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5921bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d1700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3223scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n6000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11855mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g6900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3275mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1370pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5315yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185g7escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6248scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11260hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2255scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10200hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3245mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4125scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10875hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10810uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-l13g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12100fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10750hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3225scope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core network exposure functionscope:eqversion:22.1.1

Trust: 1.0

vendor:intelmodel:celeron g5905scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6242rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1130g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2388gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6346scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1160g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6314uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1270pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4216scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4208scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2295scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1030g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1250pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6200fescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1120g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6338nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11555mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5925scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8353hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1125g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1280pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10105fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11950hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6226scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8376hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9221scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8356hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900escope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n5105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8368qscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6505tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11370hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4310scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6252nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6405tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g6900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6334scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6348scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4309yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6258rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6405scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2324gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11800hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6209uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9820xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9800xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6413escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12800hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5962bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n5030scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2314scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11555mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11850hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1140g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6212rescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6248rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4215rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-10885mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11955mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7800xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10305tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12650hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6348hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7960xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8276scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2378scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2223scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1195g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n5000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5217scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 7505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9242scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6342scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d2700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver j5040scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6600hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6425escope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6305scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5931bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6262vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1000g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1110g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4025scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5317scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6246rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11390hscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core policyscope:eqversion:22.2.0

Trust: 1.0

vendor:intelmodel:xeon e-2334scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3265scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9960xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8276lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6212uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6305escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145g7escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10710uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8280lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1155g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900hkscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core binding support functionscope:eqversion:22.1.3

Trust: 1.0

vendor:intelmodel:xeon gold 5218scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1000g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11320hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1060g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6354scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10305scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6338tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11865mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11865mldscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1270pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4314scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4310tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6330hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3265mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8351nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6211escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6252scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8362scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12500hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4504scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5905tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-10855scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8253scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6326scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6246scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1260pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9282scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1135g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j6425scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8358scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6208uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon bronze 3206rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10325scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10850kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11155mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8354hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11155mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5320hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-10855mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8376hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6425rescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8256scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2378gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1030g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11375hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6254scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2336scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6330nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8280scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8358pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8268scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6328hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j6413scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6244scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2386gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2374gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8368scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6256scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1220pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5222scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6336yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1065g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1005g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6226rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10105tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115g4escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1180g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n6005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver j5005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10885hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6312uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6250lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2356gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6242scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4316scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4209tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6338scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n6415scope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2022-0001

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-0001
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-0001
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202203-688
value: MEDIUM

Trust: 0.6

VULHUB: VHN-404550
value: LOW

Trust: 0.1

VULMON: CVE-2022-0001
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-0001
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-404550
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-0001
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.0
impactScore: 4.0
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // CNNVD: CNNVD-202203-688 // NVD: CVE-2022-0001 // NVD: CVE-2022-0001

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2022-0001

THREAT TYPE

local

Trust: 1.0

sources: PACKETSTORM: 166569 // PACKETSTORM: 178614 // PACKETSTORM: 179349 // PACKETSTORM: 179497 // CNNVD: CNNVD-202203-688

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202203-688

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-404550

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=185188

Trust: 0.6

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-0001

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-0001

Trust: 0.1

title:Ubuntu Security Notice: USN-5318-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5318-1

Trust: 0.1

title:Ubuntu Security Notice: USN-5317-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5317-1

Trust: 0.1

title:Debian Security Advisories: DSA-5095-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=145808a324d7a624b8cc14cfceaae987

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-023url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-023

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-011url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.10-2022-011

Trust: 0.1

title:Ubuntu Security Notice: USN-5362-1: Linux kernel (Intel IOTG) vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5362-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1571url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1571

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-039url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-039

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221988 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1761url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1761

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224814 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225483 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224956 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225201 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225392 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-5096-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9382520336267e8dcd400d9d993e932b

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-0001

Trust: 0.1

title: - url:https://github.com/dadav/scf

Trust: 0.1

title: - url:https://github.com/Tsuki124/crawlab-sdk

Trust: 0.1

title: - url:https://github.com/Tsuki124/crawlab-db

Trust: 0.1

title: - url:https://github.com/turbot/steampipe-plugin-trivy

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/03/15/spectre_bti_intel_amd_arm/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/03/09/microsoft_patch_tuesday/

Trust: 0.1

sources: VULMON: CVE-2022-0001 // CNNVD: CNNVD-202203-688

EXTERNAL IDS

db:NVDid:CVE-2022-0001

Trust: 3.2

db:CERT/CCid:VU#155143

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2022/03/18/2

Trust: 1.8

db:PACKETSTORMid:166569

Trust: 0.8

db:PACKETSTORMid:166248

Trust: 0.7

db:CS-HELPid:SB2022030908

Trust: 0.6

db:CS-HELPid:SB2022070643

Trust: 0.6

db:CS-HELPid:SB2022031403

Trust: 0.6

db:CS-HELPid:SB2022062931

Trust: 0.6

db:AUSCERTid:ESB-2022.2855

Trust: 0.6

db:AUSCERTid:ESB-2022.3236

Trust: 0.6

db:AUSCERTid:ESB-2022.0965

Trust: 0.6

db:AUSCERTid:ESB-2022.0994

Trust: 0.6

db:AUSCERTid:ESB-2022.1819

Trust: 0.6

db:AUSCERTid:ESB-2022.1405

Trust: 0.6

db:AUSCERTid:ESB-2022.1278

Trust: 0.6

db:AUSCERTid:ESB-2022.3136

Trust: 0.6

db:AUSCERTid:ESB-2022.1277

Trust: 0.6

db:AUSCERTid:ESB-2022.1857

Trust: 0.6

db:LENOVOid:LEN-79451

Trust: 0.6

db:CNNVDid:CNNVD-202203-688

Trust: 0.6

db:PACKETSTORMid:166241

Trust: 0.1

db:PACKETSTORMid:166243

Trust: 0.1

db:VULHUBid:VHN-404550

Trust: 0.1

db:VULMONid:CVE-2022-0001

Trust: 0.1

db:PACKETSTORMid:178614

Trust: 0.1

db:PACKETSTORMid:179061

Trust: 0.1

db:PACKETSTORMid:179349

Trust: 0.1

db:PACKETSTORMid:179375

Trust: 0.1

db:PACKETSTORMid:179497

Trust: 0.1

sources: CERT/CC: VU#155143 // VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // PACKETSTORM: 166569 // PACKETSTORM: 178614 // PACKETSTORM: 179061 // PACKETSTORM: 179349 // PACKETSTORM: 179375 // PACKETSTORM: 179497 // CNNVD: CNNVD-202203-688 // NVD: CVE-2022-0001

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220818-0004/

Trust: 1.8

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2022/03/18/2

Trust: 1.8

url:https://www.kb.cert.org/vuls/id/155143

Trust: 1.0

url:https://www.vicarius.io/vsociety/posts/cve-2022-0001-detect-specter-vulnerability?prevurl=wizard

Trust: 1.0

url:https://www.vicarius.io/vsociety/posts/cve-2022-0001-mitigate-specter-vulnerability?prevurl=wizard

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-0001

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0994

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2855

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1278

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1277

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-0001/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022030908

Trust: 0.6

url:https://packetstormsecurity.com/files/166569/ubuntu-security-notice-usn-5362-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166248/ubuntu-security-notice-usn-5319-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062931

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1819

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031403

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-79451

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1857

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0965

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1405

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3136

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070643

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3236

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-processor-information-disclosure-via-branch-predictor-selectors-37739

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2024-2201

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-47233

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-52601

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-6868-1

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2022-0001

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5318-1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0847

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0516

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25636

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5362-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0185

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4090

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23222

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-6.5/6.5.0-1020.20~22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-starfive-6.5/6.5.0-1014.15~22.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6774-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-laptop/6.5.0-1016.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-6.5/6.5.0-35.35~22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/6.5.0-1020.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-6.5/6.5.0-1021.22~22.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-26614

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/6.5.0-1023.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/6.5.0-1017.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/6.5.0-1020.20

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52602

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-26801

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-6.5/6.5.0-1023.23~22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-6.5/6.5.0-35.35.1~22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/6.5.0-35.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-starfive/6.5.0-1014.15

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52615

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-nvidia-6.5/6.5.0-1019.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/6.5.0-1021.22

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-26635

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-6.5/6.5.0-1020.20~22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lowlatency/6.5.0-35.35.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-6.5/6.5.0-1023.24

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52588

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6828-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52493

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52598

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52497

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52491

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-iotg-5.15/5.15.0-1058.64~20.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52583

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1126.135

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1087.94

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1111.123

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1132.139

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.4.0-1046.50

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-187.207

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1074.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1131.140

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1094.98

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-iot/5.4.0-1039.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1127.137

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1115.122

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33631

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-23307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-24861

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6866-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-47063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-26898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-26720

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6866-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-6270

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6868-2

Trust: 0.1

sources: VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // PACKETSTORM: 166569 // PACKETSTORM: 178614 // PACKETSTORM: 179061 // PACKETSTORM: 179349 // PACKETSTORM: 179375 // PACKETSTORM: 179497 // CNNVD: CNNVD-202203-688 // NVD: CVE-2022-0001

CREDITS

Statement Date:   April 11, 2024

Trust: 0.8

sources: CERT/CC: VU#155143

SOURCES

db:CERT/CCid:VU#155143
db:VULHUBid:VHN-404550
db:VULMONid:CVE-2022-0001
db:PACKETSTORMid:166569
db:PACKETSTORMid:178614
db:PACKETSTORMid:179061
db:PACKETSTORMid:179349
db:PACKETSTORMid:179375
db:PACKETSTORMid:179497
db:CNNVDid:CNNVD-202203-688
db:NVDid:CVE-2022-0001

LAST UPDATE DATE

2026-02-05T13:29:04.565000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#155143date:2024-04-18T00:00:00
db:VULHUBid:VHN-404550date:2022-08-19T00:00:00
db:VULMONid:CVE-2022-0001date:2022-08-19T00:00:00
db:CNNVDid:CNNVD-202203-688date:2022-08-19T00:00:00
db:NVDid:CVE-2022-0001date:2025-05-05T17:17:29.393

SOURCES RELEASE DATE

db:CERT/CCid:VU#155143date:2024-04-09T00:00:00
db:VULHUBid:VHN-404550date:2022-03-11T00:00:00
db:VULMONid:CVE-2022-0001date:2022-03-11T00:00:00
db:PACKETSTORMid:166569date:2022-04-01T15:43:44
db:PACKETSTORMid:178614date:2024-05-17T15:23:12
db:PACKETSTORMid:179061date:2024-06-12T13:56:01
db:PACKETSTORMid:179349date:2024-07-04T15:02:04
db:PACKETSTORMid:179375date:2024-07-05T15:04:48
db:PACKETSTORMid:179497date:2024-07-11T14:07:21
db:CNNVDid:CNNVD-202203-688date:2022-03-08T00:00:00
db:NVDid:CVE-2022-0001date:2022-03-11T18:15:25.143