[Git][security-tracker-team/security-tracker][master] Process some more NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Aug 12 21:56:49 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
abfc9ff2 by Salvatore Bonaccorso at 2025-08-12T22:56:18+02:00
Process some more NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -419,7 +419,7 @@ CVE-2025-24303 (Improper check for unusual or exceptional conditions in the Linu
CVE-2025-24302 (Uncontrolled recursion for some TinyCBOR libraries maintained by Intel ...)
TODO: check
CVE-2025-24296 (Improper input validation in some firmware for the Intel(R) E810 Ether ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-23241 (Integer overflow or wraparound in the Linux kernel-mode driver for som ...)
TODO: check
CVE-2025-22893 (Insufficient control flow management in the Linux kernel-mode driver f ...)
@@ -447,7 +447,7 @@ CVE-2025-22834 (AMI APTIOV contains a vulnerability in BIOS where a user may cau
CVE-2025-22830 (APTIOV contains a vulnerability in BIOS where a skilled user may cause ...)
NOT-FOR-US: AMI
CVE-2025-22392 (Out-of-bounds read in firmware for some Intel(R) AMT and Intel(R) Stan ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-21096 (Improper buffer restrictions in the firmware for some Intel(R) TDX may ...)
TODO: check
CVE-2025-21093 (Uncontrolled search path element for some Intel(R) Driver & Suppor ...)
@@ -459,9 +459,9 @@ CVE-2025-21090 (Missing reference to active allocated resource for some Intel(R)
CVE-2025-21086 (Improper input validation in the Linux kernel-mode driver for some Int ...)
TODO: check
CVE-2025-20627 (Uncontrolled search path for some Intel(R) oneAPI DPC++/C++ Compiler s ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20625 (Improper conditions check for some Intel(R) PROSet/Wireless WiFi Softw ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20613 (Predictable Seed in Pseudo-Random Number Generator (PRNG) in the firmw ...)
TODO: check
CVE-2025-20109 (Improper Isolation or Compartmentalization in the stream cache mechani ...)
@@ -477,29 +477,29 @@ CVE-2025-20092 (Uncontrolled search path for some Clock Jitter Tool software bef
CVE-2025-20090 (Untrusted Pointer Dereference for some Intel(R) QuickAssist Technology ...)
TODO: check
CVE-2025-20087 (Incorrect default permissions for some Intel(R) oneAPI DPC++/C++ Compi ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20077 (Missing release of memory after effective lifetime in the UEFI OobRasM ...)
TODO: check
CVE-2025-20074 (Time-of-check Time-of-use race condition for some Intel(R) Connectivit ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20067 (Observable timing discrepancy in firmware for some Intel(R) CSME and I ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20053 (Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmw ...)
- intel-microcode <unfixed>
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812
CVE-2025-20048 (Uncontrolled search path for the Intel(R) Trace Analyzer and Collector ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20044 (Improper locking for some Intel(R) TDX Module firmware before version ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20037 (Time-of-check time-of-use race condition in firmware for some Intel(R) ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2025-20025 (Uncontrolled recursion for some TinyCBOR libraries maintained by Intel ...)
TODO: check
CVE-2025-20023 (Incorrect default permissions for some Intel(R) Graphics Driver softwa ...)
TODO: check
CVE-2025-20017 (Uncontrolled search path for some Intel(R) oneAPI Toolkit and componen ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-54678 (A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versi ...)
NOT-FOR-US: Siemens
CVE-2024-52964 (An Improper Limitation of a Pathname to a Restricted Directory ('Path ...)
@@ -527,7 +527,7 @@ CVE-2024-40588 (Multiple relative path traversal vulnerabilities [CWE-23] in For
CVE-2024-38805 (EDK2 contains a vulnerability in BIOS where a user may cause an Intege ...)
TODO: check
CVE-2024-33607 (Out-of-bounds read in some Intel(R) TDX module software before version ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-26009 (An authentication bypass using an alternate path or channel [CWE-288] ...)
NOT-FOR-US: Fortinet
CVE-2023-45584 (A double free vulnerability [CWE-415] in Fortinet FortiOS version 7.4. ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abfc9ff2542f11e9d33657071590a4bdb266a255
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abfc9ff2542f11e9d33657071590a4bdb266a255
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250812/e08b5c22/attachment.htm>
More information about the debian-security-tracker-commits
mailing list