Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f84ee462 by Salvatore Bonaccorso at 2024-08-15T09:35:03+02:00
Add new intel-microcode CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -257,7 +257,9 @@ CVE-2024-26025 (Incorrect default permissions for some 
Intel(R) Advisor software
 CVE-2024-26022 (Improper access control in some Intel(R) UEFI Integrator Tools 
on Apti ...)
        TODO: check
 CVE-2024-25939 (Mirrored regions with different values in 3rd Generation 
Intel(R) Xeon ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
 CVE-2024-25576 (improper access control in firmware for some Intel(R) FPGA 
products be ...)
        TODO: check
 CVE-2024-25562 (Improper buffer restrictions in some Intel(R) Distribution for 
GDB sof ...)
@@ -271,13 +273,17 @@ CVE-2024-24986 (Improper access control in Linux kernel 
mode driver for some Int
 CVE-2024-24983 (Protection mechanism failure in firmware for some Intel(R) 
Ethernet Ne ...)
        TODO: check
 CVE-2024-24980 (Protection mechanism failure in some 3rd, 4th, and 5th 
Generation Inte ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
 CVE-2024-24977 (Uncontrolled search path for some Intel(R) License Manager for 
FLEXlm  ...)
        TODO: check
 CVE-2024-24973 (Improper input validation for some Intel(R) Distribution for 
GDB softw ...)
        TODO: check
 CVE-2024-24853 (Incorrect behavior order in transition between executive 
monitor and S ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
 CVE-2024-24580 (Improper conditions check in some Intel(R) Data Center GPU Max 
Series  ...)
        TODO: check
 CVE-2024-23981 (Wrap-around error in Linux kernel mode driver for some 
Intel(R) Ethern ...)
@@ -339,7 +345,9 @@ CVE-2023-50314 (IBM WebSphere Application Server Liberty 
17.0.0.3 through 24.0.0
 CVE-2023-49144 (Out of bounds read in OpenBMC Firmware for some Intel(R) 
Server Platfo ...)
        TODO: check
 CVE-2023-49141 (Improper isolation in some Intel(R) Processors stream cache 
mechanism  ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
 CVE-2023-48361 (Improper initialization in firmware for some Intel(R) CSME may 
allow a ...)
        TODO: check
 CVE-2023-43747 (Incorrect default permissions for some Intel(R) Connectivity 
Performan ...)
@@ -347,7 +355,9 @@ CVE-2023-43747 (Incorrect default permissions for some 
Intel(R) Connectivity Per
 CVE-2023-43489 (Improper access control for some Intel(R) CIP software before 
version  ...)
        TODO: check
 CVE-2023-42667 (Improper isolation in the Intel(R) Core(TM) Ultra Processor 
stream cac ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
 CVE-2023-40067 (Unchecked return value in firmware for some Intel(R) CSME may 
allow an ...)
        TODO: check
 CVE-2023-38655 (Improper buffer restrictions in firmware for some Intel(R) AMT 
and Int ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f84ee462e33b27c5fad8df8d4dcf6c0a7e998ed3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f84ee462e33b27c5fad8df8d4dcf6c0a7e998ed3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to