Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0ebe3536 by Salvatore Bonaccorso at 2022-06-28T20:24:30+02:00
Track Processor MMIO Stale Data vulnerabilities as well for src:linux

After short discussion with kernel maintainers add tracking as well for
src:linux for the three CVEs CVE-2022-21123, CVE-2022-21125,
CVE-2022-21166 on kernel side as well and not only for intel-microcode.

5.18.5, 5.15.48, 5.10.123, 5.4.199, 4.19.248, 4.14.284, and 4.9.319 all
got the fixes backported implementing the mitigations on kernel side
along with the needed intel-microcode update.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -46353,6 +46353,7 @@ CVE-2022-21180 (Improper input validation for some 
Intel(R) Processors may allow
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00645.html
 CVE-2022-21166 (Incomplete cleanup in specific special register write 
operations for s ...)
        - intel-microcode 3.20220510.1
+       - linux 5.18.5-1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
        NOTE: 
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#DRPW
        NOTE: Linux kernel documentation patch: 
https://git.kernel.org/linus/4419470191386456e0b8ed4eb06a70b0021798a6
@@ -46364,12 +46365,14 @@ CVE-2022-21127 (Incomplete cleanup in specific 
special register read operations
        NOTE: https://xenbits.xen.org/xsa/advisory-404.html
 CVE-2022-21125 (Incomplete cleanup of microarchitectural fill buffers on some 
Intel(R) ...)
        - intel-microcode 3.20220510.1
+       - linux 5.18.5-1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
        NOTE: 
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDS
        NOTE: Linux kernel documentation patch: 
https://git.kernel.org/linus/4419470191386456e0b8ed4eb06a70b0021798a6
        NOTE: NOTE: https://xenbits.xen.org/xsa/advisory-404.html
 CVE-2022-21123 (Incomplete cleanup of multi-core shared buffers for some 
Intel(R) Proc ...)
        - intel-microcode 3.20220510.1
+       - linux 5.18.5-1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
        NOTE: 
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDR
        NOTE: Linux kernel documentation patch: 
https://git.kernel.org/linus/4419470191386456e0b8ed4eb06a70b0021798a6



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ebe353669d60829d592679bfc192866cf691ec7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ebe353669d60829d592679bfc192866cf691ec7
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to