[Git][security-tracker-team/security-tracker][master] Mark intel-microcode CVEs as no-dsa

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue May 21 20:01:16 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
aee4ffd6 by Salvatore Bonaccorso at 2024-05-21T21:00:26+02:00
Mark intel-microcode CVEs as no-dsa

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4083,18 +4083,26 @@ CVE-2024-21823 (Hardware logic with insecure de-synchronization in Intel(R) DSA
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
 CVE-2023-47855 (Improper input validation in some Intel(R) TDX module software before  ...)
 	- intel-microcode 3.20240514.1
+	[bookworm] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
+	[bullseye] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
 CVE-2023-45745 (Improper input validation in some Intel(R) TDX module software before  ...)
 	- intel-microcode 3.20240514.1
+	[bookworm] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
+	[bullseye] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
 CVE-2023-46103 (Sequence of processor instructions leads to unexpected behavior in Int ...)
 	- intel-microcode 3.20240514.1
+	[bookworm] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
+	[bullseye] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
 CVE-2023-45733 (Hardware logic contains race conditions in some Intel(R) Processors ma ...)
 	- intel-microcode 3.20240514.1
+	[bookworm] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
+	[bullseye] - intel-microcode <no-dsa> (Minor issue; can be fixed in point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514
 CVE-2024-5023 (Improper Neutralization of Special Elements used in a Command ('Comman ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aee4ffd6da83efb57aa1f51a34a89cfd7742a01d

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aee4ffd6da83efb57aa1f51a34a89cfd7742a01d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240521/179b90ba/attachment.htm>


More information about the debian-security-tracker-commits mailing list