[Git][security-tracker-team/security-tracker][master] disassociate one microcode issue from intel-microcode
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Feb 23 13:28:09 GMT 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
508da566 by Moritz Muehlenhoff at 2022-02-23T14:27:22+01:00
disassociate one microcode issue from intel-microcode
one PHP issue n/a for older suites
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -77135,8 +77135,8 @@ CVE-2021-21708
{DSA-5082-1}
- php8.1 <unfixed>
- php7.4 <removed>
- - php7.3 <removed>
- - php7.0 <removed>
+ - php7.3 <not-affected> (Vulnerable code introduced in 7.4)
+ - php7.0 <not-affected> (Vulnerable code introduced in 7.4)
NOTE: Fixed in 8.1.3, 7.4.28
NOTE: PHP Bug: https://bugs.php.net/81708
CVE-2021-21707 (In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below ...)
@@ -94132,9 +94132,12 @@ CVE-2021-0148 (Insertion of information into log file in firmware for some Intel
CVE-2021-0147 (Improper locking in the Power Management Controller (PMC) for some Int ...)
NOT-FOR-US: Intel
CVE-2021-0146 (Hardware allows activation of test or debug logic at runtime for some ...)
- - intel-microcode <unfixed>
- [bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
- [buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
+ NOT-FOR-US: Intel CPU microcode
+ NOTE: This vulnerability cannot be fixed via the intel-microcode package since it
+ NOTE: needs to be present before the CPU is even initialised fully:
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/57#issuecomment-1036363145
+ NOTE: As such, updates need to be shipped via board vendors and not tracking it as
+ NOTE: a fixable bug in intel-microcode
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207
CVE-2021-0145 (Improper initialization of shared resources in some Intel(R) Processor ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/508da566b416d6ea98860217493548f52452949f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/508da566b416d6ea98860217493548f52452949f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220223/09b0c98c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list