Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5772e64d by Moritz Muehlenhoff at 2024-11-14T13:16:08+01:00
new intel-microcode issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -169,7 +169,9 @@ CVE-2024-24984 (Improper input validation for some Intel(R) 
Wireless Bluetooth(R
 CVE-2024-23919 (Improper buffer restrictions in some Intel(R) Graphics 
software may al ...)
        TODO: check
 CVE-2024-23918 (Improper conditions check in some Intel(R) Xeon(R) processor 
memory co ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-23312 (Uncontrolled search path for some Intel(R) Binary 
Configuration Tool s ...)
        TODO: check
 CVE-2024-23198 (Improper input validation in firmware for some Intel(R) 
PROSet/Wireles ...)
@@ -177,11 +179,15 @@ CVE-2024-23198 (Improper input validation in firmware for 
some Intel(R) PROSet/W
 CVE-2024-22185 (Time-of-check Time-of-use Race Condition in some Intel(R) 
processors w ...)
        TODO: check
 CVE-2024-21853 (Improper finite state machines (FSMs) in the hardware logic in 
some 4t ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-21850 (Sensitive information in resource not removed before reuse in 
some Int ...)
        TODO: check
 CVE-2024-21820 (Incorrect default permissions in some Intel(R) Xeon(R) 
processor memor ...)
-       TODO: check
+       - intel-microcode <unfixed>
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-21808 (Improper buffer restrictions in some Intel(R) VPL software 
before vers ...)
        TODO: check
 CVE-2024-21799 (Path traversal for some Intel(R) Extension for Transformers 
software b ...)
@@ -16984,12 +16990,14 @@ CVE-2024-24968 (Improper finite state machines (FSMs) 
in hardware logic in some
        [bullseye] - intel-microcode <postponed> (Minor issue)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910
+       NOTE: Got updated once more in 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-23984 (Observable discrepancy in RAPL interface for some Intel(R) 
Processors  ...)
        - intel-microcode 3.20240910.1 (bug #1081363)
        [bookworm] - intel-microcode 3.20240910.1~deb12u1
        [bullseye] - intel-microcode <postponed> (Minor issue)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910
+       NOTE: Got updated once more in 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-8639 (Use after free in Autofill in Google Chrome on Android prior to 
128.0. ...)
        {DSA-5768-1}
        - chromium 128.0.6613.137-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5772e64db87a29e5eaef024fababdcee8096faab

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5772e64db87a29e5eaef024fababdcee8096faab
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to