[Git][security-tracker-team/security-tracker][master] Process several NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jun 15 20:18:15 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e696f687 by Salvatore Bonaccorso at 2021-06-15T21:17:50+02:00
Process several NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -47244,7 +47244,7 @@ CVE-2021-0086 (Improper permissions in the installer for the Intel(R) Brand Veri
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00546.html
 	NOTE: Claimed to not affect Xen, Cf. https://xenbits.xen.org/xsa/advisory-375.html in
 	NOTE: ("NOTE CONCERNING CVE-2021-0086 / CVE-2021-26314").
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2021-0085
 	RESERVED
 CVE-2021-0084
@@ -54946,13 +54946,13 @@ CVE-2020-24511 (Improper isolation of shared resources in some Intel(R) Processo
 CVE-2020-24510
 	RESERVED
 CVE-2020-24509 (Insufficient control flow management in subsystem in Intel(R) SPS vers ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24508
 	RESERVED
 CVE-2020-24507 (Improper initialization in a subsystem in the Intel(R) CSME versions b ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24506 (Out of bound read in a subsystem in the Intel(R) CSME versions before  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24505 (Insufficient input validation in the firmware for the Intel(R) 700-ser ...)
 	NOT-FOR-US: Intel NIC firmware
 CVE-2020-24504 (Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapt ...)
@@ -54999,7 +54999,7 @@ CVE-2020-24488
 CVE-2020-24487
 	RESERVED
 CVE-2020-24486 (Improper input validation in the firmware for some Intel(R) Processors ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24485 (Improper conditions check in the Intel(R) FPGA OPAE Driver for Linux b ...)
 	NOT-FOR-US: Intel
 CVE-2020-24484
@@ -55021,11 +55021,11 @@ CVE-2020-24477
 CVE-2020-24476
 	RESERVED
 CVE-2020-24475 (Improper initialization in the BMC firmware for some Intel(R) Server B ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24474 (Buffer overflow in the BMC firmware for some Intel(R) Server Boards, S ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24473 (Out of bounds write in the BMC firmware for some Intel(R) Server Board ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-24472
 	RESERVED
 CVE-2020-24471
@@ -74373,27 +74373,27 @@ CVE-2020-15389 (jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-f
 CVE-2020-15388
 	RESERVED
 CVE-2020-15387 (The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7. ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15386 (Brocade Fabric OS prior to v9.0.1a and 8.2.3a and after v9.0.0 and 8.2 ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15385 (Brocade SANnav before version 2.1.1 allows an authenticated attacker t ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15384 (Brocade SANNav before version 2.1.1 contains an information disclosure ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15383 (Running security scans against the SAN switch can cause config and sec ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15382 (Brocade SANnav before version 2.1.1 uses a hard-coded administrator ac ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15381 (Brocade SANnav before version 2.1.1 contains an Improper Authenticatio ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15380 (Brocade SANnav before version 2.1.1 logs account credentials at the &# ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15379 (Brocade SANnav before v.2.1.0a could allow remote attackers cause a de ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15378 (The OVA version of Brocade SANnav before version 2.1.1 installation wi ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15377 (Webtools in Brocade SANnav before version 2.1.1 allows unauthenticated ...)
-	TODO: check
+	NOT-FOR-US: Brocade
 CVE-2020-15376 (Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, con ...)
 	NOT-FOR-US: Brocade Fabric OS
 CVE-2020-15375 (Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v ...)
@@ -82672,13 +82672,13 @@ CVE-2020-12362 (Integer overflow in the firmware for some Intel(R) Graphics Driv
 CVE-2020-12361 (Use after free in some Intel(R) Graphics Drivers before version 15.33. ...)
 	NOT-FOR-US: Intel graphics drivers for Windows
 CVE-2020-12360 (Out of bounds read in the firmware for some Intel(R) Processors may al ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12359 (Insufficient control flow management in the firmware for some Intel(R) ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12358 (Out of bounds write in the firmware for some Intel(R) Processors may a ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12357 (Improper initialization in the firmware for some Intel(R) Processors m ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12356 (Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.8 ...)
 	NOT-FOR-US: Intel
 CVE-2020-12355 (Authentication bypass by capture-replay in RPMB protocol message authe ...)
@@ -82831,23 +82831,23 @@ CVE-2020-12298
 CVE-2020-12297 (Improper access control in Installer for Intel(R) CSME Driver for Wind ...)
 	NOT-FOR-US: Intel
 CVE-2020-12296 (Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) con ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12295 (Improper input validation in some Intel(R) Thunderbolt(TM) controllers ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12294 (Insufficient control flow management in some Intel(R) Thunderbolt(TM)  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12293 (Improper control of a resource through its lifetime in some Intel(R) T ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12292 (Improper conditions check in some Intel(R) Thunderbolt(TM) controllers ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12291 (Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) con ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12290 (Improper access control in some Intel(R) Thunderbolt(TM) controllers m ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12289 (Out-of-bounds write in some Intel(R) Thunderbolt(TM) controllers may a ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12288 (Protection mechanism failure in some Intel(R) Thunderbolt(TM) controll ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-12287 (Incorrect permissions in the Intel(R) Distribution of OpenVINO(TM) Too ...)
 	NOT-FOR-US: Intel
 CVE-2019-20791 (OpenThread before 2019-12-13 has a stack-based buffer overflow in Mesh ...)
@@ -93424,15 +93424,15 @@ CVE-2020-8706 (Buffer overflow in a daemon for some Intel(R) Server Boards, Serv
 CVE-2020-8705 (Insecure default initialization of resource in Intel(R) Boot Guard in  ...)
 	NOT-FOR-US: Intel
 CVE-2020-8704 (Race condition in a subsystem in the Intel(R) LMS versions before 2039 ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-8703 (Improper buffer restrictions in a subsystem in the Intel(R) CSME versi ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-8702 (Uncontrolled search path element in the Intel(R) Processor Diagnostic  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-8701 (Incorrect default permissions in installer for the Intel(R) SSD Toolbo ...)
 	NOT-FOR-US: Intel
 CVE-2020-8700 (Improper input validation in the firmware for some Intel(R) Processors ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-8699
 	RESERVED
 CVE-2020-8698 (Improper isolation of shared resources in some Intel(R) Processors may ...)
@@ -93507,7 +93507,7 @@ CVE-2020-8672 (Out of bound read in BIOS firmware for 8th, 9th Generation Intel(
 CVE-2020-8671 (Insufficient control flow management in BIOS firmware 8th, 9th Generat ...)
 	NOT-FOR-US: Intel
 CVE-2020-8670 (Race condition in the firmware for some Intel(R) Processors may allow  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2020-8669 (Improper input validation in the Intel(R) Data Center Manager Console  ...)
 	NOT-FOR-US: Intel
 CVE-2020-8668



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e696f68787d667762444afde50240352d7ea8ec9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e696f68787d667762444afde50240352d7ea8ec9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210615/08283e01/attachment.htm>


More information about the debian-security-tracker-commits mailing list