Intel Processor Graphics 信息泄露漏洞

admin 2024-01-14 02:33:52 YS 来源:ZONE.CI 全球网 0 阅读模式
> Intel Processor Graphics 信息泄露漏洞

Intel Processor Graphics 信息泄露漏洞

CNNVD-ID编号 CNNVD-202001-533 CVE编号 CVE-2019-14615
发布时间 2020-01-14 更新时间 2021-01-05
漏洞类型 信息泄露 漏洞来源 Ubuntu,Apple,Benjamin M. Romer
危险等级 中危 威胁类型 本地
厂商 N/A

漏洞介绍

Intel Processor Graphics是美国英特尔(Intel)公司的一款显卡驱动。

Intel Processor Graphics中存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。

漏洞补丁

目前厂商已发布升级了Intel Processor Graphics 信息泄露漏洞的补丁,Intel Processor Graphics 信息泄露漏洞的补丁获取链接:

参考网址

来源:www.intel.com

链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4287-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4287-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4286-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4286-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4285-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4284-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4255-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4253-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4254-2/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4258-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4254-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4255-1/

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4253-1/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0719/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-14615

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0949/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0843/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0305/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156429/Ubuntu-Security-Notice-USN-4286-2.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0796/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0572.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0851/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0830/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0797/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0772/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-via-Intel-GPU-EU-State-During-Context-Switch-31335

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0572/

来源:support.apple.com

链接:https://support.apple.com/kb/HT211100

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156894/Apple-Security-Advisory-2020-03-24-2.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1042/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202001-533

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  2