Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-23824
Vulnerability from cvelistv5
Published
2022-11-09 20:48
Modified
2025-02-13 16:32
Severity ?
EPSS score ?
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | AMD Processors |
Version: Processor various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "FEDORA-2022-9f51d13fa3", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "FEDORA-2022-53a4a5dd11", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "DSA-5378", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202402-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Processor various" } ] } ], "datePublic": "2022-11-08T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T01:23:48.000Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "FEDORA-2022-9f51d13fa3", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "FEDORA-2022-53a4a5dd11", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "DSA-5378", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "url": "https://security.gentoo.org/glsa/202402-07" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23824", "datePublished": "2022-11-09T20:48:06.826Z", "dateReserved": "2022-01-21T00:00:00.000Z", "dateUpdated": "2025-02-13T16:32:23.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-23824\",\"sourceIdentifier\":\"[email protected]\",\"published\":\"2022-11-09T21:15:13.530\",\"lastModified\":\"2024-11-21T06:49:19.587\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.\"},{\"lang\":\"es\",\"value\":\"IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"[email protected]\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"[email protected]\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA1950D-1D9F-4401-AA86-CF3028EFD286\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD38BB02-752E-44C8-B878-FF7D4E95B452\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6AC60D3-EE6C-46A3-8068-158D83995BD1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60123EE-1B7B-4430-8B01-0591F31D54D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DDA64FE-29DE-4A7B-82D0-D409B38BB67A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0464E67E-DC8F-48CB-BA80-B3E3B7EC835F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6317AB4-E945-4BF6-A11B-7D076AEF74A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88E56678-04A0-447E-BC96-0CF73A340C9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7947AC99-3250-46C6-8C92-382F8956B39B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE7A27E-1900-4D51-B5F8-9C243CF3E544\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9E0845-FB81-47FC-B083-D7A76AA49D14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824EE36A-E397-476A-B5CF-0C131FA74079\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484FC127-05CB-423F-8CEE-C442ABEBC7E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005989E4-6826-46D8-AEFA-3B07FB6EF31C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303F661B-45E9-4AC1-9B98-62E4D705102D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4A79BA-E498-4819-96C5-3D607A2727DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8A44FC-9790-4202-80BE-203AD0E86E15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132192AC-BC59-4C61-B826-F91A82956437\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684F36CB-2355-45F5-B6E1-7157CA9225D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192EE6CF-0494-458F-96EF-311FB6076AAF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A05BAA-D9ED-411D-AEC7-DBD8998C345E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B4FEA-CFB2-429C-818B-9277B6D546C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180B3002-B3C5-48B5-8322-5B64B237C5B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C8CF00-8FC8-4206-9028-6F104699DE76\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07E922F-C1AB-469C-A1C1-9F9E58332DFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE5D42-1C62-4381-89E0-8F3264F696EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168076CD-1E6D-4328-AB59-4C1A90735AC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02B1C69-BAA4-485B-BE22-46BE321F9E4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B3C659-C31A-4F82-9587-9F8A943F637D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FAAD8C-6DD1-408D-849B-0CE707321B13\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA61ADB-2FEA-459A-BF4F-C55401479107\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF5F66-636C-4637-96F7-0FA45BB7C64B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492017EE-C13F-4C40-887F-9C3C9F439898\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E02A9C95-DF12-4816-88C3-6AFC331B8426\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE640-381F-449B-ACB1-F1BD255683C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC4BECA-6023-4225-9685-937E47C67C1F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D2C602-8086-4FC4-AE89-0842A453E56E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D777E18-B7ED-42CF-A2C4-87426B04E8EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237AB35F-1702-418D-8193-F8B387B7F644\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5EE04-23BC-48E6-A171-D63C8258E317\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0005355A-DA7A-417D-8AF9-F6CC880040BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA92163-5A72-4271-89D4-401C24950F62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"954500F1-6466-4A1C-8E0C-D759121CEBDC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D7F33C-F522-4A20-9055-1662178D7F27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBF39F8-2317-432A-846D-7FEC2C35EEE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9825AB7C-7675-4364-BCE3-4C63BD41780A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937E2FA2-BED8-48FF-8D01-153D4039F224\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D814C2A-D794-46A8-9A06-CC4DB387176F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D640C5C-C906-41A2-96BC-19299ADB9446\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474D45CF-EBBE-4013-B8EC-BCA3293B36B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D70D28B-809E-456C-96ED-84A4CA7EC942\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D1E9A6F-7339-4679-B83B-87BC1BEEFA16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BEC933-8C69-4E47-B527-DA3ED3233B2D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978DF75D-F7B7-40F6-8054-9551306106F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE43349A-246E-45E9-8CD5-E417DB270445\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D99997-1389-493E-BDEA-9904A46E48EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99E921-4023-4E28-BAB7-A830487B3850\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"211D05DA-2A44-4FC6-9EE4-8A6D713AC967\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824EE36A-E397-476A-B5CF-0C131FA74079\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADD2AB0-D3F7-43BD-A1FF-3CBE33044661\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484FC127-05CB-423F-8CEE-C442ABEBC7E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB1063F-5264-4036-A2C0-4473E9E5119C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03C008C-2705-42DC-9BC4-DF1414F536A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005989E4-6826-46D8-AEFA-3B07FB6EF31C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95702F66-17CF-4C92-AF63-CD7A8A54A351\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303F661B-45E9-4AC1-9B98-62E4D705102D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1582461F-9752-43C5-A2E2-099956D94341\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4A79BA-E498-4819-96C5-3D607A2727DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA058E5-3CB8-4C30-AE22-3B6759A5F905\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856830B6-6EAF-483C-91FD-940EC248E533\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8A44FC-9790-4202-80BE-203AD0E86E15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD598982-D2BE-4313-85A7-A2169C08A288\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"132192AC-BC59-4C61-B826-F91A82956437\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAFF906F-6379-4BFF-8E23-A9AC9AE443DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684F36CB-2355-45F5-B6E1-7157CA9225D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94221075-DD47-45FD-8A2A-D364573FFDF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192EE6CF-0494-458F-96EF-311FB6076AAF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572B9A2B-F23D-4EFE-8ACC-3D8357158D02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"382DA0A9-0ADF-4ECC-AF71-CE021DC8B359\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE43349A-246E-45E9-8CD5-E417DB270445\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A86733-31A4-4146-9539-01883B0D315A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D99997-1389-493E-BDEA-9904A46E48EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC97F277-4BFD-41D7-A205-631C6FBE8DAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC4654E-519B-4412-B551-F2436108152B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54611A05-BCA3-495A-8CDB-946FF47E0333\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38997E8B-D2B7-4AB2-BB6E-33966511AF38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99E921-4023-4E28-BAB7-A830487B3850\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454A72B-76EC-46D9-8675-97DC076D7615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F74102-CBC1-4BB8-80A7-A2DCB6F4239A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AE0210-F156-42BA-AAD5-177A2E845A4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978DF75D-F7B7-40F6-8054-9551306106F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F67023B-114D-46FC-A26B-23E2BAB8DD61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60123EE-1B7B-4430-8B01-0591F31D54D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F54EB87-09B7-4E80-A646-5284B884B059\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DDA64FE-29DE-4A7B-82D0-D409B38BB67A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E157B59-9642-457B-BB3C-FBA629F43CBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD38BB02-752E-44C8-B878-FF7D4E95B452\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FAEA47-94A3-4C5A-9A6E-4E47A42BA130\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6AC60D3-EE6C-46A3-8068-158D83995BD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1811B5C7-013C-4965-AB2E-B0A089605E42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE7A27E-1900-4D51-B5F8-9C243CF3E544\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A82FC5-5646-47B7-B6BB-84A374DFD864\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9E0845-FB81-47FC-B083-D7A76AA49D14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE02F8EE-421E-4487-8C91-AB2880C7056B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6317AB4-E945-4BF6-A11B-7D076AEF74A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF86B7B-4028-41C7-938E-8F299568CB19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88E56678-04A0-447E-BC96-0CF73A340C9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E33072D-4807-4803-83EA-90D0A721B835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7947AC99-3250-46C6-8C92-382F8956B39B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540041FD-F241-4EA4-BBBC-16B28449779A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0464E67E-DC8F-48CB-BA80-B3E3B7EC835F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E04BD-4B95-4513-B832-30DF5332B77E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA61ADB-2FEA-459A-BF4F-C55401479107\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C5C135-D432-4AEC-BB40-01FDA6A6E995\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF5F66-636C-4637-96F7-0FA45BB7C64B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5F3921-FA39-4896-8546-DE603A70374A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE640-381F-449B-ACB1-F1BD255683C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6512668F-EEFB-4654-AE7F-9F71F89F3B65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC4BECA-6023-4225-9685-937E47C67C1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031C2DA9-0E24-450C-B57A-DC7C519D5F47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D2C602-8086-4FC4-AE89-0842A453E56E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8198CED9-216C-4573-B766-B6CDB3E6F7CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D777E18-B7ED-42CF-A2C4-87426B04E8EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237AB35F-1702-418D-8193-F8B387B7F644\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62878C38-D2E3-452E-98FF-2ED2B6C256B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5EE04-23BC-48E6-A171-D63C8258E317\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B75781D-051F-44C1-B79F-1C32AFECFF65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D7F33C-F522-4A20-9055-1662178D7F27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78AB5531-B88E-478C-A723-ADAE3E0C87F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBF39F8-2317-432A-846D-7FEC2C35EEE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2093BCDB-70F3-4D90-B899-B2801F8A6059\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F24782C-DBE2-488F-B935-49B4A8BC1E29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9825AB7C-7675-4364-BCE3-4C63BD41780A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02B85FAD-49E4-4DE4-BF8B-88F3C9772779\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B1F092-A9EA-4245-A154-2DFEA5D2A01F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFDD574D-1799-4386-A906-705DC2F0978F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9B37D9-8A56-4058-9AFF-3BE64D95CC23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0359E9DA-5BC0-48FD-962C-34358691E7DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937E2FA2-BED8-48FF-8D01-153D4039F224\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936CD5C8-F583-40AB-A9F1-81CADD0CEF42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A45A30A-6857-419E-8816-7EC9F8C8FEF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D814C2A-D794-46A8-9A06-CC4DB387176F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA963063-2CBC-4CF4-8DD9-47A9448C6FBC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFCD485-4013-48A4-8D88-F5D53BAC9065\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27AC88BB-3495-4B0D-8C3F-8E6C46304E2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F0D63B0-369D-4337-AC25-F0851C0C15C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14B4470-CF19-40F0-A765-08BA391F0E45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D640C5C-C906-41A2-96BC-19299ADB9446\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD852DB5-720F-473E-99EB-F037E81AA567\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0005355A-DA7A-417D-8AF9-F6CC880040BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F5D1C5-6AAE-4226-A627-9F37D7131102\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755801C1-7058-4584-BB7B-BE2BF9D5B78B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59172BDD-6177-4E6E-B9D7-C453EB1D651A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492017EE-C13F-4C40-887F-9C3C9F439898\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BBC2B42-DEBE-4696-928A-353F48FA9546\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9BEC933-8C69-4E47-B527-DA3ED3233B2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EF33521-012B-45BC-A860-7A5ADAB74488\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D1E9A6F-7339-4679-B83B-87BC1BEEFA16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE6D732-6F55-4130-B95A-01ACC6EAB85F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474D45CF-EBBE-4013-B8EC-BCA3293B36B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC61EAFD-15EA-427B-8419-E6EB2BCD78CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D70D28B-809E-456C-96ED-84A4CA7EC942\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68244A90-6F59-4960-BB91-F2B8A745E2BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"954500F1-6466-4A1C-8E0C-D759121CEBDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F6F176F-78BA-4E92-8C3E-0B7C7018F265\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E839C5C6-5544-4976-9AE7-55AADA09A48E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA92163-5A72-4271-89D4-401C24950F62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"738B7B07-8F15-4DCD-A361-70C1FF9CB4EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E02A9C95-DF12-4816-88C3-6AFC331B8426\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1031085D-AD15-4124-803E-9B742E7484A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808C582D-4F80-4378-B177-012EEF438443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337E685C-4B65-441C-AD06-E8374CC39450\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DA33B2-B942-447F-9229-A41808411F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610909ED-A636-4007-A50F-500057340E70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1498B525-660E-4D96-B723-FBDB65684F0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B92B63F-3C30-4C00-9734-37CCA865FED9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49CEC694-DF98-47C7-8C7B-0A26EDC413BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4847AB9-1A77-46BD-9236-FE8FFC4670B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B4FEA-CFB2-429C-818B-9277B6D546C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE35B376-F439-428B-A299-CBEEE0BEFF3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"014AE81A-ACEE-4E0A-A3FF-412DF86AE00C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FB895BB-AEA5-4A4E-A9DE-EAD48656187D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB8E11E-5816-4ABB-849F-E10C1CFB39ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08A2432-6FCE-4579-89FE-EB0348F1BE8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D64F03-2F90-490B-844B-5F0F08B49294\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C952A84-3DA2-448F-85AC-573C270C312D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C8CF00-8FC8-4206-9028-6F104699DE76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B0CC20-FF43-4341-90BE-FA365CC4E53B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE69C69-9D13-4DF9-A5F2-69435598CA8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED76988B-0245-4C25-876C-CACC57B04B8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE5D42-1C62-4381-89E0-8F3264F696EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8480358-5313-4308-90F7-F93D9B11C66C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168076CD-1E6D-4328-AB59-4C1A90735AC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16540EDF-3CC7-4E51-9E67-1A530330C951\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A05BAA-D9ED-411D-AEC7-DBD8998C345E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73789139-3498-4ED8-A80C-A8794BC176A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE409172-E478-4557-977E-8EDF016F061D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99075640-17C5-47EA-B9B5-FE72BA9C62C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D489967C-CD37-44C3-B8DB-7B813562909F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB83D414-FD6D-4502-B487-F0D00DAD3972\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D964031-15E2-461B-BC1B-213EF720E720\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77566843-4A30-441F-8FBA-7D3C76907BB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A18D2F3-39A4-4D1E-963E-6D5BF93615FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52817B56-DC1B-46C7-9F86-AE2E7328B7A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9921332-9BAE-4D93-A2FD-576D9BA72408\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8915EEB-7957-4145-B9CF-DEFDD2D613F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BBC3B4-BD63-4895-AE29-E59396806AA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82315CD-2E07-4BDE-9A9F-D06640680D76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A14E26-5950-4B06-8AEE-5FF03415F4DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955DF45C-0F81-4EE8-B7E2-0687122253AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00715133-F99C-49F2-9B0B-16D2F15E4D49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71C2E30-E155-49B8-B90F-F9844A25C155\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B3C659-C31A-4F82-9587-9F8A943F637D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F37AAF-A618-46C3-9C49-4B6CD9BDA830\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FAAD8C-6DD1-408D-849B-0CE707321B13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC216C0-16D7-4DF0-A5C4-A952E4916925\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02B1C69-BAA4-485B-BE22-46BE321F9E4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929A1953-903C-4B1D-B148-88E5A2F500BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B309264-F40F-4DEF-BBDB-1CC96E903EA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"849E6D95-C3A8-457E-90D9-34ECAE5D1519\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE52C09-8D8C-4D93-BCF7-4C53728FDA49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A481233E-C479-4715-BB6C-CA5BCD6E3AD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D58FB5-0093-4487-8506-8430ED650258\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0100D1-E4CF-4062-A260-D707845BF81A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00718CCC-EE1B-4365-B1C0-E92D6662D9DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0546350C-6DF6-43AC-8439-578D2D292C09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B016179A-6567-497E-9756-3B8EEC7FC1EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07E922F-C1AB-469C-A1C1-9F9E58332DFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74293FA6-D960-451F-A071-68F2E2AE86CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE347B8-4B81-4332-ADFA-8A19D62D40D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4E052F-4883-4F6B-87B8-CFC432525948\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180B3002-B3C5-48B5-8322-5B64B237C5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"609C4E3C-CFA6-43BC-8E9D-852E518B08D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83955DFE-A91C-424A-AA6D-785964C97C09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8505FAC6-A96D-4788-B23F-960D5AB533C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8502D97B-8208-431B-B350-32504B904816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B48649-1E70-49CC-8E1A-5262B58A43B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/10/2\",\"source\":\"[email protected]\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/\",\"source\":\"[email protected]\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/\",\"source\":\"[email protected]\"},{\"url\":\"https://security.gentoo.org/glsa/202402-07\",\"source\":\"[email protected]\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040\",\"source\":\"[email protected]\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5378\",\"source\":\"[email protected]\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/10/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202402-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5378\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2022-23824
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-23824", "id": "GSD-2022-23824", "references": [ "https://www.suse.com/security/cve/CVE-2022-23824.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-23824" ], "details": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "id": "GSD-2022-23824", "modified": "2023-12-13T01:19:35.192023Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "[email protected]", "ID": "CVE-2022-23824", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMD Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "Processor various " } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/10/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "https://www.debian.org/security/2023/dsa-5378", "refsource": "MISC", "url": "https://www.debian.org/security/2023/dsa-5378" }, { "name": "https://security.gentoo.org/glsa/202402-07", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202402-07" } ] }, "source": { "discovery": "EXTERNAL" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "211D05DA-2A44-4FC6-9EE4-8A6D713AC967", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AADD2AB0-D3F7-43BD-A1FF-3CBE33044661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EB1063F-5264-4036-A2C0-4473E9E5119C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03C008C-2705-42DC-9BC4-DF1414F536A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95702F66-17CF-4C92-AF63-CD7A8A54A351", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1582461F-9752-43C5-A2E2-099956D94341", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA058E5-3CB8-4C30-AE22-3B6759A5F905", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "856830B6-6EAF-483C-91FD-940EC248E533", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD598982-D2BE-4313-85A7-A2169C08A288", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAFF906F-6379-4BFF-8E23-A9AC9AE443DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94221075-DD47-45FD-8A2A-D364573FFDF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B9A2B-F23D-4EFE-8ACC-3D8357158D02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F67023B-114D-46FC-A26B-23E2BAB8DD61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F54EB87-09B7-4E80-A646-5284B884B059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E157B59-9642-457B-BB3C-FBA629F43CBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FAEA47-94A3-4C5A-9A6E-4E47A42BA130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1811B5C7-013C-4965-AB2E-B0A089605E42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6A82FC5-5646-47B7-B6BB-84A374DFD864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE02F8EE-421E-4487-8C91-AB2880C7056B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCF86B7B-4028-41C7-938E-8F299568CB19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E33072D-4807-4803-83EA-90D0A721B835", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "540041FD-F241-4EA4-BBBC-16B28449779A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFCD485-4013-48A4-8D88-F5D53BAC9065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." }, { "lang": "es", "value": "IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2022-23824", "lastModified": "2024-02-04T08:15:09.267", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }, "published": "2022-11-09T21:15:13.530", "references": [ { "source": "[email protected]", "tags": [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "source": "[email protected]", "url": "https://security.gentoo.org/glsa/202402-07" }, { "source": "[email protected]", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2023/dsa-5378" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "[email protected]", "type": "Primary" } ] } } } }
ghsa-hhhj-6x4j-w995
Vulnerability from github
Published
2022-11-10 12:01
Modified
2022-11-15 12:00
Severity ?
Details
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
{ "affected": [], "aliases": [ "CVE-2022-23824" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-09T21:15:00Z", "severity": "MODERATE" }, "details": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "id": "GHSA-hhhj-6x4j-w995", "modified": "2022-11-15T12:00:21Z", "published": "2022-11-10T12:01:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23824" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202402-07" }, { "type": "WEB", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5378" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
suse-su-2023:0169-1
Vulnerability from csaf_suse
Published
2023-01-26 17:30
Modified
2023-01-26 17:30
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
Non-security fixes:
- Updated to version 4.16.3 (bsc#1027519).
Patchnames
SUSE-2023-169,SUSE-SLE-Micro-5.3-2023-169,SUSE-SLE-Module-Basesystem-15-SP4-2023-169,SUSE-SLE-Module-Server-Applications-15-SP4-2023-169,openSUSE-Leap-Micro-5.3-2023-169,openSUSE-SLE-15.4-2023-169
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n\nNon-security fixes:\n\n- Updated to version 4.16.3 (bsc#1027519).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-169,SUSE-SLE-Micro-5.3-2023-169,SUSE-SLE-Module-Basesystem-15-SP4-2023-169,SUSE-SLE-Module-Server-Applications-15-SP4-2023-169,openSUSE-Leap-Micro-5.3-2023-169,openSUSE-SLE-15.4-2023-169", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0169-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0169-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230169-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0169-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-01-26T17:30:00Z", "generator": { "date": "2023-01-26T17:30:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0169-1", "initial_release_date": "2023-01-26T17:30:00Z", "revision_history": [ { "date": "2023-01-26T17:30:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.16.3_02-150400.4.19.1.aarch64", "product": { "name": "xen-4.16.3_02-150400.4.19.1.aarch64", "product_id": "xen-4.16.3_02-150400.4.19.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.16.3_02-150400.4.19.1.aarch64", "product": { "name": "xen-devel-4.16.3_02-150400.4.19.1.aarch64", "product_id": "xen-devel-4.16.3_02-150400.4.19.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64", "product": { "name": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64", "product_id": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.16.3_02-150400.4.19.1.aarch64", "product": { "name": "xen-libs-4.16.3_02-150400.4.19.1.aarch64", "product_id": "xen-libs-4.16.3_02-150400.4.19.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.16.3_02-150400.4.19.1.aarch64", "product": { "name": "xen-tools-4.16.3_02-150400.4.19.1.aarch64", "product_id": "xen-tools-4.16.3_02-150400.4.19.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64", "product": { "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64", "product_id": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.16.3_02-150400.4.19.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.16.3_02-150400.4.19.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.16.3_02-150400.4.19.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.16.3_02-150400.4.19.1.i586", "product": { "name": "xen-devel-4.16.3_02-150400.4.19.1.i586", "product_id": "xen-devel-4.16.3_02-150400.4.19.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.16.3_02-150400.4.19.1.i586", "product": { "name": "xen-libs-4.16.3_02-150400.4.19.1.i586", "product_id": "xen-libs-4.16.3_02-150400.4.19.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.i586", "product": { "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.i586", "product_id": "xen-tools-domU-4.16.3_02-150400.4.19.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-4.16.3_02-150400.4.19.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-devel-4.16.3_02-150400.4.19.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-libs-4.16.3_02-150400.4.19.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-tools-4.16.3_02-150400.4.19.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "product": { "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "product_id": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-devel-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-tools-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64" }, "product_reference": "xen-4.16.3_02-150400.4.19.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64" }, "product_reference": "xen-devel-4.16.3_02-150400.4.19.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-devel-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64" }, "product_reference": "xen-doc-html-4.16.3_02-150400.4.19.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-doc-html-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64" }, "product_reference": "xen-libs-4.16.3_02-150400.4.19.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-libs-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64" }, "product_reference": "xen-tools-4.16.3_02-150400.4.19.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-tools-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64" }, "product_reference": "xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.3_02-150400.4.19.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.3_02-150400.4.19.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.3_02-150400.4.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-26T17:30:00Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
suse-su-2023:0214-1
Vulnerability from csaf_suse
Published
2023-01-30 16:27
Modified
2023-01-30 16:27
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).
Patchnames
SUSE-2023-214,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-214,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-214,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-214,SUSE-Storage-7-2023-214
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-214,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-214,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-214,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-214,SUSE-Storage-7-2023-214", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0214-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0214-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230214-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0214-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-01-30T16:27:15Z", "generator": { "date": "2023-01-30T16:27:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0214-1", "initial_release_date": "2023-01-30T16:27:15Z", "revision_history": [ { "date": "2023-01-30T16:27:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.13.4_18-150200.3.68.1.aarch64", "product": { "name": "xen-4.13.4_18-150200.3.68.1.aarch64", "product_id": "xen-4.13.4_18-150200.3.68.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.13.4_18-150200.3.68.1.aarch64", "product": { "name": "xen-devel-4.13.4_18-150200.3.68.1.aarch64", "product_id": "xen-devel-4.13.4_18-150200.3.68.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.4_18-150200.3.68.1.aarch64", "product": { "name": "xen-doc-html-4.13.4_18-150200.3.68.1.aarch64", "product_id": "xen-doc-html-4.13.4_18-150200.3.68.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.13.4_18-150200.3.68.1.aarch64", "product": { "name": "xen-libs-4.13.4_18-150200.3.68.1.aarch64", "product_id": "xen-libs-4.13.4_18-150200.3.68.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.13.4_18-150200.3.68.1.aarch64", "product": { "name": "xen-tools-4.13.4_18-150200.3.68.1.aarch64", "product_id": "xen-tools-4.13.4_18-150200.3.68.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.aarch64", "product": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.aarch64", "product_id": "xen-tools-domU-4.13.4_18-150200.3.68.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.13.4_18-150200.3.68.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.13.4_18-150200.3.68.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.13.4_18-150200.3.68.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.13.4_18-150200.3.68.1.i586", "product": { "name": "xen-devel-4.13.4_18-150200.3.68.1.i586", "product_id": "xen-devel-4.13.4_18-150200.3.68.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.13.4_18-150200.3.68.1.i586", "product": { "name": "xen-libs-4.13.4_18-150200.3.68.1.i586", "product_id": "xen-libs-4.13.4_18-150200.3.68.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.i586", "product": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.i586", "product_id": "xen-tools-domU-4.13.4_18-150200.3.68.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-4.13.4_18-150200.3.68.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-devel-4.13.4_18-150200.3.68.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-doc-html-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-doc-html-4.13.4_18-150200.3.68.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-libs-4.13.4_18-150200.3.68.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-libs-32bit-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-libs-32bit-4.13.4_18-150200.3.68.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-tools-4.13.4_18-150200.3.68.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "product": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "product_id": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-devel-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-libs-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_18-150200.3.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_18-150200.3.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-01-30T16:27:15Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
suse-su-2023:0186-1
Vulnerability from csaf_suse
Published
2023-01-27 10:26
Modified
2023-01-27 10:26
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
Patchnames
SUSE-2023-186,SUSE-SLE-SERVER-12-SP2-BCL-2023-186
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-186,SUSE-SLE-SERVER-12-SP2-BCL-2023-186", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0186-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0186-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230186-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0186-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-01-27T10:26:43Z", "generator": { "date": "2023-01-27T10:26:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0186-1", "initial_release_date": "2023-01-27T10:26:43Z", "revision_history": [ { "date": "2023-01-27T10:26:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.7.6_30-43.101.1.aarch64", "product": { "name": "xen-4.7.6_30-43.101.1.aarch64", "product_id": "xen-4.7.6_30-43.101.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.7.6_30-43.101.1.aarch64", "product": { "name": "xen-devel-4.7.6_30-43.101.1.aarch64", "product_id": "xen-devel-4.7.6_30-43.101.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_30-43.101.1.aarch64", "product": { "name": "xen-doc-html-4.7.6_30-43.101.1.aarch64", "product_id": "xen-doc-html-4.7.6_30-43.101.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_30-43.101.1.aarch64", "product": { "name": "xen-libs-4.7.6_30-43.101.1.aarch64", "product_id": "xen-libs-4.7.6_30-43.101.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_30-43.101.1.aarch64", "product": { "name": "xen-tools-4.7.6_30-43.101.1.aarch64", "product_id": "xen-tools-4.7.6_30-43.101.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_30-43.101.1.aarch64", "product": { "name": "xen-tools-domU-4.7.6_30-43.101.1.aarch64", "product_id": "xen-tools-domU-4.7.6_30-43.101.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.7.6_30-43.101.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.7.6_30-43.101.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.7.6_30-43.101.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.7.6_30-43.101.1.i586", "product": { "name": "xen-devel-4.7.6_30-43.101.1.i586", "product_id": "xen-devel-4.7.6_30-43.101.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.7.6_30-43.101.1.i586", "product": { "name": "xen-libs-4.7.6_30-43.101.1.i586", "product_id": "xen-libs-4.7.6_30-43.101.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_30-43.101.1.i586", "product": { "name": "xen-tools-domU-4.7.6_30-43.101.1.i586", "product_id": "xen-tools-domU-4.7.6_30-43.101.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-4.7.6_30-43.101.1.x86_64", "product_id": "xen-4.7.6_30-43.101.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-devel-4.7.6_30-43.101.1.x86_64", "product_id": "xen-devel-4.7.6_30-43.101.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-doc-html-4.7.6_30-43.101.1.x86_64", "product_id": "xen-doc-html-4.7.6_30-43.101.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-libs-4.7.6_30-43.101.1.x86_64", "product_id": "xen-libs-4.7.6_30-43.101.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64", "product_id": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-tools-4.7.6_30-43.101.1.x86_64", "product_id": "xen-tools-4.7.6_30-43.101.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_30-43.101.1.x86_64", "product": { "name": "xen-tools-domU-4.7.6_30-43.101.1.x86_64", "product_id": "xen-tools-domU-4.7.6_30-43.101.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64" }, "product_reference": "xen-4.7.6_30-43.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_30-43.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64" }, "product_reference": "xen-libs-4.7.6_30-43.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_30-43.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64" }, "product_reference": "xen-tools-4.7.6_30-43.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_30-43.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_30-43.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_30-43.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_30-43.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-27T10:26:43Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
suse-su-2023:0136-1
Vulnerability from csaf_suse
Published
2023-01-25 10:20
Modified
2023-01-25 10:20
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
Patchnames
SUSE-2023-136,SUSE-OpenStack-Cloud-9-2023-136,SUSE-OpenStack-Cloud-Crowbar-9-2023-136,SUSE-SLE-SAP-12-SP4-2023-136,SUSE-SLE-SERVER-12-SP4-LTSS-2023-136
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-136,SUSE-OpenStack-Cloud-9-2023-136,SUSE-OpenStack-Cloud-Crowbar-9-2023-136,SUSE-SLE-SAP-12-SP4-2023-136,SUSE-SLE-SERVER-12-SP4-LTSS-2023-136", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0136-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0136-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230136-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0136-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-01-25T10:20:51Z", "generator": { "date": "2023-01-25T10:20:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0136-1", "initial_release_date": "2023-01-25T10:20:51Z", "revision_history": [ { "date": "2023-01-25T10:20:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.11.4_36-2.86.1.aarch64", "product": { "name": "xen-4.11.4_36-2.86.1.aarch64", "product_id": "xen-4.11.4_36-2.86.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.11.4_36-2.86.1.aarch64", "product": { "name": "xen-devel-4.11.4_36-2.86.1.aarch64", "product_id": "xen-devel-4.11.4_36-2.86.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.11.4_36-2.86.1.aarch64", "product": { "name": "xen-doc-html-4.11.4_36-2.86.1.aarch64", "product_id": "xen-doc-html-4.11.4_36-2.86.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.11.4_36-2.86.1.aarch64", "product": { "name": "xen-libs-4.11.4_36-2.86.1.aarch64", "product_id": "xen-libs-4.11.4_36-2.86.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.11.4_36-2.86.1.aarch64", "product": { "name": "xen-tools-4.11.4_36-2.86.1.aarch64", "product_id": "xen-tools-4.11.4_36-2.86.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_36-2.86.1.aarch64", "product": { "name": "xen-tools-domU-4.11.4_36-2.86.1.aarch64", "product_id": "xen-tools-domU-4.11.4_36-2.86.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.11.4_36-2.86.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.11.4_36-2.86.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.11.4_36-2.86.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.11.4_36-2.86.1.i586", "product": { "name": "xen-devel-4.11.4_36-2.86.1.i586", "product_id": "xen-devel-4.11.4_36-2.86.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.11.4_36-2.86.1.i586", "product": { "name": "xen-libs-4.11.4_36-2.86.1.i586", "product_id": "xen-libs-4.11.4_36-2.86.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_36-2.86.1.i586", "product": { "name": "xen-tools-domU-4.11.4_36-2.86.1.i586", "product_id": "xen-tools-domU-4.11.4_36-2.86.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-4.11.4_36-2.86.1.x86_64", "product_id": "xen-4.11.4_36-2.86.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-devel-4.11.4_36-2.86.1.x86_64", "product_id": "xen-devel-4.11.4_36-2.86.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-doc-html-4.11.4_36-2.86.1.x86_64", "product_id": "xen-doc-html-4.11.4_36-2.86.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-libs-4.11.4_36-2.86.1.x86_64", "product_id": "xen-libs-4.11.4_36-2.86.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "product_id": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-tools-4.11.4_36-2.86.1.x86_64", "product_id": "xen-tools-4.11.4_36-2.86.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64", "product": { "name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64", "product_id": "xen-tools-domU-4.11.4_36-2.86.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_36-2.86.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_36-2.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_36-2.86.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_36-2.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-25T10:20:51Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
suse-su-2023:0170-1
Vulnerability from csaf_suse
Published
2023-01-26 17:30
Modified
2023-01-26 17:30
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).
Patchnames
SUSE-2023-170,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-170,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-170,SUSE-SLE-Product-RT-15-SP3-2023-170,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-170,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-170,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-170,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-170,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-170,SUSE-SUSE-MicroOS-5.1-2023-170,SUSE-SUSE-MicroOS-5.2-2023-170,SUSE-Storage-7.1-2023-170,openSUSE-Leap-Micro-5.2-2023-170
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative security issues (bsc#1205209).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-170,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-170,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-170,SUSE-SLE-Product-RT-15-SP3-2023-170,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-170,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-170,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-170,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-170,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-170,SUSE-SUSE-MicroOS-5.1-2023-170,SUSE-SUSE-MicroOS-5.2-2023-170,SUSE-Storage-7.1-2023-170,openSUSE-Leap-Micro-5.2-2023-170", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0170-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0170-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230170-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0170-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-01-26T17:30:23Z", "generator": { "date": "2023-01-26T17:30:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0170-1", "initial_release_date": "2023-01-26T17:30:23Z", "revision_history": [ { "date": "2023-01-26T17:30:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.14.5_10-150300.3.45.1.aarch64", "product": { "name": "xen-4.14.5_10-150300.3.45.1.aarch64", "product_id": "xen-4.14.5_10-150300.3.45.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.14.5_10-150300.3.45.1.aarch64", "product": { "name": "xen-devel-4.14.5_10-150300.3.45.1.aarch64", "product_id": "xen-devel-4.14.5_10-150300.3.45.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.5_10-150300.3.45.1.aarch64", "product": { "name": "xen-doc-html-4.14.5_10-150300.3.45.1.aarch64", "product_id": "xen-doc-html-4.14.5_10-150300.3.45.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.14.5_10-150300.3.45.1.aarch64", "product": { "name": "xen-libs-4.14.5_10-150300.3.45.1.aarch64", "product_id": "xen-libs-4.14.5_10-150300.3.45.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.14.5_10-150300.3.45.1.aarch64", "product": { "name": "xen-tools-4.14.5_10-150300.3.45.1.aarch64", "product_id": "xen-tools-4.14.5_10-150300.3.45.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.aarch64", "product": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.aarch64", "product_id": "xen-tools-domU-4.14.5_10-150300.3.45.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.14.5_10-150300.3.45.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.14.5_10-150300.3.45.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.14.5_10-150300.3.45.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.14.5_10-150300.3.45.1.i586", "product": { "name": "xen-devel-4.14.5_10-150300.3.45.1.i586", "product_id": "xen-devel-4.14.5_10-150300.3.45.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.14.5_10-150300.3.45.1.i586", "product": { "name": "xen-libs-4.14.5_10-150300.3.45.1.i586", "product_id": "xen-libs-4.14.5_10-150300.3.45.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.i586", "product": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.i586", "product_id": "xen-tools-domU-4.14.5_10-150300.3.45.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-4.14.5_10-150300.3.45.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-devel-4.14.5_10-150300.3.45.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-doc-html-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-doc-html-4.14.5_10-150300.3.45.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-libs-4.14.5_10-150300.3.45.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-libs-32bit-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-libs-32bit-4.14.5_10-150300.3.45.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-tools-4.14.5_10-150300.3.45.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "product": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "product_id": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.2", "product": { "name": "openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Manager Retail Branch Server 4.2", "product_id": "SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-devel-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.5_10-150300.3.45.1.x86_64 as component of openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" }, "product_reference": "xen-libs-4.14.5_10-150300.3.45.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Retail Branch Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Retail Branch Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "SUSE Manager Server 4.2:xen-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.5_10-150300.3.45.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.5_10-150300.3.45.1.noarch", "openSUSE Leap Micro 5.2:xen-libs-4.14.5_10-150300.3.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-26T17:30:23Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
suse-su-2023:0672-1
Vulnerability from csaf_suse
Published
2023-03-08 12:17
Modified
2023-03-08 12:17
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
Patchnames
SUSE-2023-672,SUSE-SLE-SDK-12-SP5-2023-672,SUSE-SLE-SERVER-12-SP5-2023-672
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-672,SUSE-SLE-SDK-12-SP5-2023-672,SUSE-SLE-SERVER-12-SP5-2023-672", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0672-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0672-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230672-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0672-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-03-08T12:17:10Z", "generator": { "date": "2023-03-08T12:17:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0672-1", "initial_release_date": "2023-03-08T12:17:10Z", "revision_history": [ { "date": "2023-03-08T12:17:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_32-3.85.4.aarch64", "product": { "name": "xen-4.12.4_32-3.85.4.aarch64", "product_id": "xen-4.12.4_32-3.85.4.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_32-3.85.4.aarch64", "product": { "name": "xen-devel-4.12.4_32-3.85.4.aarch64", "product_id": "xen-devel-4.12.4_32-3.85.4.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_32-3.85.4.aarch64", "product": { "name": "xen-doc-html-4.12.4_32-3.85.4.aarch64", "product_id": "xen-doc-html-4.12.4_32-3.85.4.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_32-3.85.4.aarch64", "product": { "name": "xen-libs-4.12.4_32-3.85.4.aarch64", "product_id": "xen-libs-4.12.4_32-3.85.4.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_32-3.85.4.aarch64", "product": { "name": "xen-tools-4.12.4_32-3.85.4.aarch64", "product_id": "xen-tools-4.12.4_32-3.85.4.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_32-3.85.4.aarch64", "product": { "name": "xen-tools-domU-4.12.4_32-3.85.4.aarch64", "product_id": "xen-tools-domU-4.12.4_32-3.85.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_32-3.85.4.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_32-3.85.4.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_32-3.85.4.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_32-3.85.4.i586", "product": { "name": "xen-devel-4.12.4_32-3.85.4.i586", "product_id": "xen-devel-4.12.4_32-3.85.4.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_32-3.85.4.i586", "product": { "name": "xen-libs-4.12.4_32-3.85.4.i586", "product_id": "xen-libs-4.12.4_32-3.85.4.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_32-3.85.4.i586", "product": { "name": "xen-tools-domU-4.12.4_32-3.85.4.i586", "product_id": "xen-tools-domU-4.12.4_32-3.85.4.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-4.12.4_32-3.85.4.x86_64", "product_id": "xen-4.12.4_32-3.85.4.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-devel-4.12.4_32-3.85.4.x86_64", "product_id": "xen-devel-4.12.4_32-3.85.4.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-doc-html-4.12.4_32-3.85.4.x86_64", "product_id": "xen-doc-html-4.12.4_32-3.85.4.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-libs-4.12.4_32-3.85.4.x86_64", "product_id": "xen-libs-4.12.4_32-3.85.4.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "product_id": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-tools-4.12.4_32-3.85.4.x86_64", "product_id": "xen-tools-4.12.4_32-3.85.4.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64", "product": { "name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64", "product_id": "xen-tools-domU-4.12.4_32-3.85.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_32-3.85.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64" }, "product_reference": "xen-devel-4.12.4_32-3.85.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-devel-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-doc-html-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-libs-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-tools-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-doc-html-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-libs-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-tools-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_32-3.85.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_32-3.85.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_32-3.85.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_32-3.85.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-03-08T12:17:10Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
suse-su-2023:0154-1
Vulnerability from csaf_suse
Published
2023-01-26 14:46
Modified
2023-01-26 14:46
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
Patchnames
SUSE-2023-154,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-154,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-154,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-154,SUSE-Storage-6-2023-154
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-154,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-154,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-154,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-154,SUSE-Storage-6-2023-154", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0154-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0154-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230154-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0154-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html" }, { "category": "self", "summary": "SUSE Bug 1205209", "url": "https://bugzilla.suse.com/1205209" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23824 page", "url": "https://www.suse.com/security/cve/CVE-2022-23824/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-01-26T14:46:10Z", "generator": { "date": "2023-01-26T14:46:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0154-1", "initial_release_date": "2023-01-26T14:46:10Z", "revision_history": [ { "date": "2023-01-26T14:46:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_32-150100.3.83.1.aarch64", "product": { "name": "xen-4.12.4_32-150100.3.83.1.aarch64", "product_id": "xen-4.12.4_32-150100.3.83.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_32-150100.3.83.1.aarch64", "product": { "name": "xen-devel-4.12.4_32-150100.3.83.1.aarch64", "product_id": "xen-devel-4.12.4_32-150100.3.83.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_32-150100.3.83.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_32-150100.3.83.1.aarch64", "product_id": "xen-doc-html-4.12.4_32-150100.3.83.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_32-150100.3.83.1.aarch64", "product": { "name": "xen-libs-4.12.4_32-150100.3.83.1.aarch64", "product_id": "xen-libs-4.12.4_32-150100.3.83.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_32-150100.3.83.1.aarch64", "product": { "name": "xen-tools-4.12.4_32-150100.3.83.1.aarch64", "product_id": "xen-tools-4.12.4_32-150100.3.83.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.aarch64", "product_id": "xen-tools-domU-4.12.4_32-150100.3.83.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_32-150100.3.83.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_32-150100.3.83.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_32-150100.3.83.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_32-150100.3.83.1.i586", "product": { "name": "xen-devel-4.12.4_32-150100.3.83.1.i586", "product_id": "xen-devel-4.12.4_32-150100.3.83.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_32-150100.3.83.1.i586", "product": { "name": "xen-libs-4.12.4_32-150100.3.83.1.i586", "product_id": "xen-libs-4.12.4_32-150100.3.83.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.i586", "product": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.i586", "product_id": "xen-tools-domU-4.12.4_32-150100.3.83.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-4.12.4_32-150100.3.83.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-devel-4.12.4_32-150100.3.83.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-doc-html-4.12.4_32-150100.3.83.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-libs-4.12.4_32-150100.3.83.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_32-150100.3.83.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-tools-4.12.4_32-150100.3.83.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "product_id": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-devel-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-libs-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23824" } ], "notes": [ { "category": "general", "text": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23824", "url": "https://www.suse.com/security/cve/CVE-2022-23824" }, { "category": "external", "summary": "SUSE Bug 1205209 for CVE-2022-23824", "url": "https://bugzilla.suse.com/1205209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_32-150100.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_32-150100.3.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-26T14:46:10Z", "details": "moderate" } ], "title": "CVE-2022-23824" } ] }
fkie_cve-2022-23824
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 06:49
Severity ?
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "211D05DA-2A44-4FC6-9EE4-8A6D713AC967", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AADD2AB0-D3F7-43BD-A1FF-3CBE33044661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EB1063F-5264-4036-A2C0-4473E9E5119C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03C008C-2705-42DC-9BC4-DF1414F536A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95702F66-17CF-4C92-AF63-CD7A8A54A351", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1582461F-9752-43C5-A2E2-099956D94341", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA058E5-3CB8-4C30-AE22-3B6759A5F905", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "856830B6-6EAF-483C-91FD-940EC248E533", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD598982-D2BE-4313-85A7-A2169C08A288", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAFF906F-6379-4BFF-8E23-A9AC9AE443DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94221075-DD47-45FD-8A2A-D364573FFDF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B9A2B-F23D-4EFE-8ACC-3D8357158D02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F67023B-114D-46FC-A26B-23E2BAB8DD61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F54EB87-09B7-4E80-A646-5284B884B059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E157B59-9642-457B-BB3C-FBA629F43CBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FAEA47-94A3-4C5A-9A6E-4E47A42BA130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1811B5C7-013C-4965-AB2E-B0A089605E42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6A82FC5-5646-47B7-B6BB-84A374DFD864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE02F8EE-421E-4487-8C91-AB2880C7056B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCF86B7B-4028-41C7-938E-8F299568CB19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E33072D-4807-4803-83EA-90D0A721B835", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "540041FD-F241-4EA4-BBBC-16B28449779A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1C9BEEF-1773-4DE0-BB4B-6E8F0D01873D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFCD485-4013-48A4-8D88-F5D53BAC9065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." }, { "lang": "es", "value": "IBPB no puede evitar que las predicciones de sucursales de retorno sean especificadas por objetivos de sucursales anteriores a IBPB, lo que lleva a una posible divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2022-23824", "lastModified": "2024-11-21T06:49:19.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }, "published": "2022-11-09T21:15:13.530", "references": [ { "source": "[email protected]", "tags": [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "source": "[email protected]", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "source": "[email protected]", "url": "https://security.gentoo.org/glsa/202402-07" }, { "source": "[email protected]", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "source": "[email protected]", "url": "https://www.debian.org/security/2023/dsa-5378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202402-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2023/dsa-5378" } ], "sourceIdentifier": "[email protected]", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "[email protected]", "type": "Primary" } ] }
WID-SEC-W-2022-2001
Vulnerability from csaf_certbund
Published
2022-11-08 23:00
Modified
2023-03-08 23:00
Summary
AMD Prozessor: Schwachstelle ermöglicht Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) für die darauf laufenden Systeme (Domains) paravirtualisiert.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in AMD Prozessoren und Xen ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Prozessoren sind die zentralen Rechenwerke eines Computers.\r\nXen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in AMD Prozessoren und Xen ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "[email protected]", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2001 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2001.json" }, { "category": "self", "summary": "WID-SEC-2022-2001 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0672-1 vom 2023-03-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html" }, { "category": "external", "summary": "AMD Security Bulletin vom 2022-11-08", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "category": "external", "summary": "Xen Security Advisory vom 2022-11-08", "url": "https://xenbits.xen.org/xsa/advisory-422.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0136-1 vom 2023-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0170-1 vom 2023-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0169-1 vom 2023-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0154-1 vom 2023-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0186-1 vom 2023-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0214-1 vom 2023-01-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html" } ], "source_lang": "en-US", "title": "AMD Prozessor: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2023-03-08T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:37:49.790+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-2001", "initial_release_date": "2022-11-08T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "2", "summary": "Anpassung" }, { "date": "2022-11-16T23:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: FEDORA-2022-53A4A5DD11" }, { "date": "2023-01-25T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-26T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-29T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-30T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-08T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AMD Prozessor", "product": { "name": "AMD Prozessor", "product_id": "T019554", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:-" } } } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Open Source Xen", "product": { "name": "Open Source Xen", "product_id": "T000611", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in AMD Prozessoren und Xen. Diese besteht in der Komponente \"Indirect Branch Prediction Barrier\" welche zum Schutz vor Spectre-Angriffen dienen soll. Diese verh\u00e4lt sich nicht wie vorgesehen und kann es dadurch erm\u00f6glichen Branch Predicitions durchzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T019554", "T002207", "T000611" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-23824" } ] }
wid-sec-w-2022-2001
Vulnerability from csaf_certbund
Published
2022-11-08 23:00
Modified
2023-03-08 23:00
Summary
AMD Prozessor: Schwachstelle ermöglicht Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) für die darauf laufenden Systeme (Domains) paravirtualisiert.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in AMD Prozessoren und Xen ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Prozessoren sind die zentralen Rechenwerke eines Computers.\r\nXen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in AMD Prozessoren und Xen ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "[email protected]", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2001 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2001.json" }, { "category": "self", "summary": "WID-SEC-2022-2001 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0672-1 vom 2023-03-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/014000.html" }, { "category": "external", "summary": "AMD Security Bulletin vom 2022-11-08", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "category": "external", "summary": "Xen Security Advisory vom 2022-11-08", "url": "https://xenbits.xen.org/xsa/advisory-422.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0136-1 vom 2023-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013521.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0170-1 vom 2023-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013540.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0169-1 vom 2023-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013545.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0154-1 vom 2023-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013550.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0186-1 vom 2023-01-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013555.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0214-1 vom 2023-01-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013595.html" } ], "source_lang": "en-US", "title": "AMD Prozessor: Schwachstelle erm\u00f6glicht Offenlegung von Informationen", "tracking": { "current_release_date": "2023-03-08T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:37:49.790+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-2001", "initial_release_date": "2022-11-08T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "2", "summary": "Anpassung" }, { "date": "2022-11-16T23:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: FEDORA-2022-53A4A5DD11" }, { "date": "2023-01-25T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-26T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-29T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-30T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-08T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AMD Prozessor", "product": { "name": "AMD Prozessor", "product_id": "T019554", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:-" } } } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Open Source Xen", "product": { "name": "Open Source Xen", "product_id": "T000611", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23824", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in AMD Prozessoren und Xen. Diese besteht in der Komponente \"Indirect Branch Prediction Barrier\" welche zum Schutz vor Spectre-Angriffen dienen soll. Diese verh\u00e4lt sich nicht wie vorgesehen und kann es dadurch erm\u00f6glichen Branch Predicitions durchzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T019554", "T002207", "T000611" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-23824" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.