Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5f3b42dc by Salvatore Bonaccorso at 2024-11-15T22:25:52+01:00
Associate some CVEs from Intel to Intel VPL

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -714,11 +714,19 @@ CVE-2024-28881 (Uncontrolled search path for some 
Intel(R) Fortran Compiler Clas
 CVE-2024-28169 (Cleartext transmission of sensitive information for some BigDL 
softwar ...)
        NOT-FOR-US: Intel
 CVE-2024-28051 (Out-of-bounds read in some Intel(R) VPL software before 
version 24.1.4 ...)
-       NOT-FOR-US: Intel
+       - intel-mediasdk <removed>
+       [bookworm] - intel-mediasdk <ignored> (No specific details published, 
development stalled and scheduled for removal from Debian)
+       - onevpl-intel-gpu 24.3.3-1
+       [bookworm] - onevpl-intel-gpu <ignored> (Minor issue)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html
 CVE-2024-28049 (Improper input validation in firmware for some Intel(R) 
PROSet/Wireles ...)
        TODO: check
 CVE-2024-28030 (NULL pointer dereference in some Intel(R) VPL software before 
version  ...)
-       NOT-FOR-US: Intel
+       - intel-mediasdk <removed>
+       [bookworm] - intel-mediasdk <ignored> (No specific details published, 
development stalled and scheduled for removal from Debian)
+       - onevpl-intel-gpu 24.3.3-1
+       [bookworm] - onevpl-intel-gpu <ignored> (Minor issue)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html
 CVE-2024-28028 (Improper input validation in some Intel(R) Neural Compressor 
software  ...)
        NOT-FOR-US: Intel
 CVE-2024-27200 (Improper access control in some Intel(R) Granulate(TM) 
software before ...)
@@ -758,11 +766,19 @@ CVE-2024-21820 (Incorrect default permissions in some 
Intel(R) Xeon(R) processor
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-21808 (Improper buffer restrictions in some Intel(R) VPL software 
before vers ...)
-       NOT-FOR-US: Intel
+       - intel-mediasdk <removed>
+       [bookworm] - intel-mediasdk <ignored> (No specific details published, 
development stalled and scheduled for removal from Debian)
+       - onevpl-intel-gpu 24.3.3-1
+       [bookworm] - onevpl-intel-gpu <ignored> (Minor issue)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html
 CVE-2024-21799 (Path traversal for some Intel(R) Extension for Transformers 
software b ...)
        NOT-FOR-US: Intel
 CVE-2024-21783 (Integer overflow for some Intel(R) VPL software before version 
24.1.4  ...)
-       NOT-FOR-US: Intel
+       - intel-mediasdk <removed>
+       [bookworm] - intel-mediasdk <ignored> (No specific details published, 
development stalled and scheduled for removal from Debian)
+       - onevpl-intel-gpu 24.3.3-1
+       [bookworm] - onevpl-intel-gpu <ignored> (Minor issue)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html
 CVE-2024-11206 (Unauthorized access vulnerability in the mobile application 
(com.trans ...)
        NOT-FOR-US: com.transsion.phoenix
 CVE-2024-11193 (An information disclosure vulnerability exists in Yugabyte 
Anywhere, w ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5f3b42dca3be7312a965f472692a9af37c634b33

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5f3b42dca3be7312a965f472692a9af37c634b33
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to