[Git][security-tracker-team/security-tracker][master] Track fixed version for intel-microcode issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 15 05:06:25 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
04f94f9f by Salvatore Bonaccorso at 2024-11-15T06:05:55+01:00
Track fixed version for intel-microcode issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -379,7 +379,7 @@ CVE-2024-24984 (Improper input validation for some Intel(R) Wireless Bluetooth(R
 CVE-2024-23919 (Improper buffer restrictions in some Intel(R) Graphics software may al ...)
 	TODO: check
 CVE-2024-23918 (Improper conditions check in some Intel(R) Xeon(R) processor memory co ...)
-	- intel-microcode <unfixed> (bug #1087532)
+	- intel-microcode 3.20241112.1 (bug #1087532)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-23312 (Uncontrolled search path for some Intel(R) Binary Configuration Tool s ...)
@@ -389,13 +389,13 @@ CVE-2024-23198 (Improper input validation in firmware for some Intel(R) PROSet/W
 CVE-2024-22185 (Time-of-check Time-of-use Race Condition in some Intel(R) processors w ...)
 	NOT-FOR-US: Intel
 CVE-2024-21853 (Improper finite state machines (FSMs) in the hardware logic in some 4t ...)
-	- intel-microcode <unfixed> (bug #1087532)
+	- intel-microcode 3.20241112.1 (bug #1087532)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-21850 (Sensitive information in resource not removed before reuse in some Int ...)
 	NOT-FOR-US: Intel
 CVE-2024-21820 (Incorrect default permissions in some Intel(R) Xeon(R) processor memor ...)
-	- intel-microcode <unfixed> (bug #1087532)
+	- intel-microcode 3.20241112.1 (bug #1087532)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
 CVE-2024-21808 (Improper buffer restrictions in some Intel(R) VPL software before vers ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/04f94f9f6c6771dcf2d24b05dd70ab567180e5c2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/04f94f9f6c6771dcf2d24b05dd70ab567180e5c2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241115/732c6869/attachment.htm>


More information about the debian-security-tracker-commits mailing list