"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-11-11 18:01:49 +00:00
parent 59484ff868
commit e109200cef
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 13 additions and 10 deletions

View File

@ -41,7 +41,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service.\nIf intercepted the token can give an attacker admin level access in the cloud controller." "value": "Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller."
} }
] ]
}, },

View File

@ -41,7 +41,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. " "value": "In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes."
} }
] ]
}, },
@ -79,8 +79,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266" "url": "https://support.lenovo.com/us/en/product_security/LEN-49266",
"name": "https://support.lenovo.com/us/en/product_security/LEN-49266"
} }
] ]
}, },

View File

@ -73,15 +73,16 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-44725" "url": "https://support.lenovo.com/us/en/product_security/LEN-44725",
"name": "https://support.lenovo.com/us/en/product_security/LEN-44725"
} }
] ]
}, },
"solution": [ "solution": [
{ {
"lang": "eng", "lang": "eng",
"value": "Use the Intel® AMT Configuration Utility 12.2.0.150 or later to verify the EHBC is enabled. \nCheck EHBC Status: ACUConfig.exe /verbose /output console Status\nTo disable Intel EHBC: ACUConfig.exe DisableEhbcState" "value": "Use the Intel\u00ae AMT Configuration Utility 12.2.0.150 or later to verify the EHBC is enabled. \nCheck EHBC Status: ACUConfig.exe /verbose /output console Status\nTo disable Intel EHBC: ACUConfig.exe DisableEhbcState"
} }
], ],
"source": { "source": {

View File

@ -41,7 +41,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution. " "value": "A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution."
} }
] ]
}, },
@ -79,8 +79,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266" "url": "https://support.lenovo.com/us/en/product_security/LEN-49266",
"name": "https://support.lenovo.com/us/en/product_security/LEN-49266"
} }
] ]
}, },