Intel Processor Graphics 信息泄露漏洞
CNNVD-ID编号 | CNNVD-202001-533 | CVE编号 | CVE-2019-14615 |
发布时间 | 2020-01-14 | 更新时间 | 2021-01-05 |
漏洞类型 | 信息泄露 | 漏洞来源 | Ubuntu,Apple,Benjamin M. Romer |
危险等级 | 中危 | 威胁类型 | 本地 |
厂商 | N/A |
漏洞介绍
Intel Processor Graphics是美国英特尔(Intel)公司的一款显卡驱动。
Intel Processor Graphics中存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
漏洞补丁
目前厂商已发布升级了Intel Processor Graphics 信息泄露漏洞的补丁,Intel Processor Graphics 信息泄露漏洞的补丁获取链接:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
参考网址
来源:www.intel.com
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4287-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4287-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4286-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4286-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4285-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4284-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4255-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4253-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4254-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4258-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4254-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4255-1/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4253-1/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0719/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-14615
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0949/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0843/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0305/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156429/Ubuntu-Security-Notice-USN-4286-2.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0796/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0572.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0851/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1745.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0830/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0797/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0772/
来源:vigilance.fr
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0572/
来源:support.apple.com
链接:https://support.apple.com/kb/HT211100
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156894/Apple-Security-Advisory-2020-03-24-2.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1042/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1745/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1812/
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202001-533

评论