[Git][security-tracker-team/security-tracker][master] intel-microcode fixed in sid

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Mar 15 15:48:10 GMT 2023


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1d90f132 by Moritz Muehlenhoff at 2023-03-15T16:47:30+01:00
intel-microcode fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -49139,7 +49139,7 @@ CVE-2022-38401 (Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier)
 CVE-2022-38102
 	RESERVED
 CVE-2022-38090 (Improper isolation of shared resources in some Intel(R) Processors whe ...)
-	- intel-microcode <unfixed> (bug #1031334)
+	- intel-microcode 3.20230214.1 (bug #1031334)
 	[bullseye] - intel-microcode <no-dsa> (Minor issue)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214
@@ -54695,7 +54695,7 @@ CVE-2022-34846
 CVE-2022-34657
 	RESERVED
 CVE-2022-33196 (Incorrect default permissions in some memory controller configurations ...)
-	- intel-microcode <unfixed> (bug #1031334)
+	- intel-microcode 3.20230214.1 (bug #1031334)
 	[bullseye] - intel-microcode <no-dsa> (Minor issue)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214
@@ -58757,7 +58757,7 @@ CVE-2022-34488 (Improper buffer restrictions in the firmware for some Intel(R) N
 CVE-2022-34346 (Out-of-bounds read in the Intel(R) Media SDK software before version 2 ...)
 	NOT-FOR-US: Intel
 CVE-2022-33972 (Incorrect calculation in microcode keying mechanism for some 3rd Gener ...)
-	- intel-microcode <unfixed> (bug #1031334)
+	- intel-microcode 3.20230214.1 (bug #1031334)
 	[bullseye] - intel-microcode <no-dsa> (Minor issue)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214
@@ -106578,7 +106578,7 @@ CVE-2021-43746 (Adobe Premiere Rush versions 1.5.16 (and earlier) allows access
 CVE-2021-3961 (snipe-it is vulnerable to Improper Neutralization of Input During Web  ...)
 	- snipe-it <itp> (bug #1005172)
 CVE-2022-21216 (Insufficient granularity of access control in out-of-band management i ...)
-	- intel-microcode <unfixed> (bug #1031334)
+	- intel-microcode 3.20230214.1 (bug #1031334)
 	[bullseye] - intel-microcode <no-dsa> (Minor issue)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1d90f13291b38af4fa8c87afa604bf856e65ac89

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1d90f13291b38af4fa8c87afa604bf856e65ac89
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230315/e878293b/attachment.htm>


More information about the debian-security-tracker-commits mailing list