Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-8832

Опубликовано: 10 апр. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1
CVSS3: 5.5

Описание

The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.

РелизСтатусПримечание
bionic

released

4.15.0-91.92
devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

not-affected

esm-infra/bionic

released

4.15.0-91.92
esm-infra/xenial

not-affected

precise/esm

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

not-affected

Показывать по

РелизСтатусПримечание
bionic

released

4.15.0-1063.67
devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

ignored

was needs-triage ESM criteria
esm-infra/bionic

released

4.15.0-1063.67
esm-infra/xenial

not-affected

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needs-triage ESM criteria]
upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

superseded by linux-aws-5.3, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

released

4.15.0-1063.67~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

released

4.15.0-1063.67~16.04.1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

released

4.15.0-1074.79~14.04.1
esm-infra/bionic

ignored

superseded by linux-azure-5.3, was needs-triage
esm-infra/xenial

released

4.15.0-1075.80
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

released

4.15.0-1074.79~14.04.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

superseded by linux-azure-5.3, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

ignored

end of standard support, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

esm-infra/xenial

released

4.15.0-1058.62
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

end of kernel support, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

released

4.15.0-1055.58
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

4.15.0-1055.58
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

esm-infra/xenial

released

4.15.0-91.92~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

superseded by linux-hwe-5.4, was needs-triage
esm-infra/xenial

ignored

superseded by linux-hwe, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

released

4.15.0-1056.57
devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

4.15.0-1056.57
esm-infra/xenial

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

not-affected

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

not-affected

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

released

4.15.0-1076.86
devel

DNE

eoan

released

4.15.0-1076.86
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

4.15.0-1076.86
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

ignored

end of standard support, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

not-affected

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

released

4.15.0-1035.39
devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

4.15.0-1035.39
esm-infra/xenial

released

4.15.0-1035.38~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

intel only
devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

not-affected

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

xenial

not-affected

Показывать по

EPSS

Процентиль: 54%
0.00312
Низкий

2.1 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
почти 6 лет назад

The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.

CVSS3: 5.5
nvd
почти 6 лет назад

The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.

CVSS3: 5.5
debian
почти 6 лет назад

The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 (" ...

CVSS3: 5.5
github
больше 3 лет назад

The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.

CVSS3: 5.5
fstec
около 8 лет назад

Уязвимость модуля i915 ядра операционных систем Linux, позволяющая нарушителю получить доступ к защищаемой информации

EPSS

Процентиль: 54%
0.00312
Низкий

2.1 Low

CVSS2

5.5 Medium

CVSS3

Уязвимость CVE-2020-8832