[Git][security-tracker-team/security-tracker][master] Reserve DLA-3808-1 for intel-microcode

Tobias Frost (@tobi) tobi at debian.org
Sat May 4 16:16:19 BST 2024



Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b2394717 by Tobias Frost at 2024-05-04T17:15:59+02:00
Reserve DLA-3808-1 for intel-microcode

- - - - -


3 changed files:

- data/CVE/list
- data/DLA/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -17884,35 +17884,30 @@ CVE-2023-43490 (Incorrect calculation in microcode keying mechanism for some Int
 	- intel-microcode 3.20240312.1 (bug #1066108)
 	[bookworm] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	[bullseye] - intel-microcode <postponed> (Decide after exposure on unstable for update)
-	[buster] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312
 CVE-2023-39368 (Protection mechanism failure of bus lock regulator for some Intel(R) P ...)
 	- intel-microcode 3.20240312.1 (bug #1066108)
 	[bookworm] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	[bullseye] - intel-microcode <postponed> (Decide after exposure on unstable for update)
-	[buster] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312
 CVE-2023-38575 (Non-transparent sharing of return predictor targets between contexts i ...)
 	- intel-microcode 3.20240312.1 (bug #1066108)
 	[bookworm] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	[bullseye] - intel-microcode <postponed> (Decide after exposure on unstable for update)
-	[buster] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312
 CVE-2023-22655 (Protection mechanism failure in some 3rd and 4th Generation Intel(R) X ...)
 	- intel-microcode 3.20240312.1 (bug #1066108)
 	[bookworm] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	[bullseye] - intel-microcode <postponed> (Decide after exposure on unstable for update)
-	[buster] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312
 CVE-2023-28746 (Information exposure through microarchitectural state after transient  ...)
 	- intel-microcode 3.20240312.1 (bug #1066108)
 	[bookworm] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	[bullseye] - intel-microcode <postponed> (Decide after exposure on unstable for update)
-	[buster] - intel-microcode <postponed> (Decide after exposure on unstable for update)
 	- linux 6.7.9-2
 	[bookworm] - linux 6.1.82-1
 	- xen <unfixed>


=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[04 May 2024] DLA-3808-1 intel-microcode - security update
+	{CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490}
+	[buster] - intel-microcode 3.20240312.1~deb10u1
 [04 May 2024] DLA-3807-1 glibc - security update
 	{CVE-2024-2961}
 	[buster] - glibc 2.28-10+deb10u3


=====================================
data/dla-needed.txt
=====================================
@@ -105,12 +105,6 @@ i2p
   NOTE: 20230809: Added by Front-Desk (Beuc)
   NOTE: 20230809: Experimental issue-based workflow: please self-assign and follow https://salsa.debian.org/lts-team/lts-updates-tasks/-/issues/28
 --
-intel-microcode (tobi)
-  NOTE: 20240502: Added by Front-Desk (Beuc)
-  NOTE: 20240502: Update being tested in unstable,
-  NOTE: 20240502: (CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490)
-  NOTE: 20240502: Follow PU: #1068082 and #1068084 (Beuc/front-desk)
---
 jenkins-htmlunit-core-js
   NOTE: 20231231: Added by Front-Desk (lamby)
   NOTE: 20231231: Needs checking that this is definitely vulnerable: a quick glance



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b23947176c7ede9a9b9260cbea8ad041a135fe44

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b23947176c7ede9a9b9260cbea8ad041a135fe44
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240504/23364836/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list