ALT-BU-2023-8319-1
Branch c9f2 update bulletin.
Package firmware-intel-ucode updated to version 23-alt1.20231114 for branch c9f2 in task 334548.
Closed vulnerabilities
Modified: 2024-05-31
BDU:2019-01957
Уязвимость процессоров Intel, связанная с микроархитектурной выборкой данных некэшируемой памяти (MDSUM), позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-12-03
BDU:2019-01958
Уязвимость порта загрузки MLPDS микропрограммного обеспечения Intel, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-05-31
BDU:2019-01959
Уязвимость процессоров Intel, связанная с восстановлением содержимого буферов заполнения (MFBDS), позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-05-31
BDU:2019-01960
Уязвимость буфера данных MSBDS микропрограммного обеспечения Intel, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2021-12-17
BDU:2020-00306
Уязвимость процессоров Intel, связанная с утечкой в буфер хранения (Store Buffer) результатов операций чтения из векторных регистров, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2021-08-20
BDU:2020-00307
Уязвимость процессоров Intel, вызванная утечкой данных из кэша L1D, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2022-10-17
BDU:2020-04459
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2022-01-24
BDU:2020-05478
Уязвимость процессоров Intel, связанная с недостатками разграничения доступа, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2022-01-24
BDU:2020-05479
Уязвимость процессоров Intel, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-05-31
BDU:2020-05481
Уязвимость драйвера для процессоров Intel(R) ядра операционной системы Linux, связанная с недостатками контроля доступа, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2022-01-24
BDU:2020-05482
Уязвимость интерфейса RAPL процессоров Intel, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-09-16
BDU:2021-03383
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-09-16
BDU:2021-03384
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-09-16
BDU:2021-03385
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с ошибками в настройках безопасности, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2025-10-16
BDU:2021-05803
Уязвимость микропрограммного обеспечения BIOS/UEFI процессоров Intel, позволяющая нарушителю повысить свои привилегии и получить несанкционированный доступ к защищаемой информации
Modified: 2023-01-17
BDU:2022-03898
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с неверным управлением генерацией кода, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2022-09-23
BDU:2022-05683
Уязвимость микрокода процессоров Intel Microcode, связанная с недостаточным использованием потоков, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2022-09-23
BDU:2022-05690
Уязвимость микрокода процессоров Intel Intel Microcode, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2022-10-04
BDU:2022-05788
Уязвимость микрокода процессоров Intel Microcode, связанная с ошибками инициализации памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2025-08-19
BDU:2023-04663
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с утечкой информации из векторных регистров, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2025-08-19
BDU:2023-07325
Уязвимость микропрограммного обеспечения процессоров Intel, позволяющая нарушителю повысить свои привилегии (с третьего до нулевого кольца защиты (CPL0)), получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2023-07603
Уязвимость микрокода процессоров Intel Microcode, связанная с возможностью авария резервного оборудования путём несанкционированного внедрения ошибок, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-08-19
BDU:2023-07639
Уязвимость микрокода процессоров Intel Microcode, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2018-12126
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2019/Nov/16
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2019/Nov/16
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
Modified: 2024-11-21
CVE-2018-12127
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2019/Nov/16
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2019/Nov/16
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
Modified: 2024-11-21
CVE-2018-12130
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2019/Nov/16
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2019/Nov/16
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
Modified: 2024-11-21
CVE-2019-11091
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en
- https://access.redhat.com/errata/RHSA-2019:1455
- https://access.redhat.com/errata/RHSA-2019:2553
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10292
- https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/
- https://seclists.org/bugtraq/2019/Jun/28
- https://seclists.org/bugtraq/2019/Jun/36
- https://seclists.org/bugtraq/2019/Nov/15
- https://seclists.org/bugtraq/2020/Jan/21
- https://security.gentoo.org/glsa/202003-56
- https://usn.ubuntu.com/3977-3/
- https://www.debian.org/security/2020/dsa-4602
- https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
- https://www.synology.com/security/advisory/Synology_SA_19_24
Modified: 2024-11-21
CVE-2020-0543
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html
- http://www.openwall.com/lists/oss-security/2020/07/14/5
- https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10318
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
- https://usn.ubuntu.com/4385-1/
- https://usn.ubuntu.com/4387-1/
- https://usn.ubuntu.com/4388-1/
- https://usn.ubuntu.com/4389-1/
- https://usn.ubuntu.com/4390-1/
- https://usn.ubuntu.com/4391-1/
- https://usn.ubuntu.com/4392-1/
- https://usn.ubuntu.com/4393-1/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html
- http://www.openwall.com/lists/oss-security/2020/07/14/5
- https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10318
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
- https://usn.ubuntu.com/4385-1/
- https://usn.ubuntu.com/4387-1/
- https://usn.ubuntu.com/4388-1/
- https://usn.ubuntu.com/4389-1/
- https://usn.ubuntu.com/4390-1/
- https://usn.ubuntu.com/4391-1/
- https://usn.ubuntu.com/4392-1/
- https://usn.ubuntu.com/4393-1/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html
Modified: 2024-11-21
CVE-2020-0548
Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
- https://security.netapp.com/advisory/ntap-20200210-0004/
- https://usn.ubuntu.com/4385-1/
- https://www.debian.org/security/2020/dsa-4701
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
- https://security.netapp.com/advisory/ntap-20200210-0004/
- https://usn.ubuntu.com/4385-1/
- https://www.debian.org/security/2020/dsa-4701
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html
Modified: 2024-11-21
CVE-2020-0549
Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10318
- https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
- https://security.netapp.com/advisory/ntap-20200210-0004/
- https://usn.ubuntu.com/4385-1/
- https://www.debian.org/security/2020/dsa-4701
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10318
- https://lists.debian.org/debian-lts-announce/2020/06/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/
- https://security.netapp.com/advisory/ntap-20200210-0004/
- https://usn.ubuntu.com/4385-1/
- https://www.debian.org/security/2020/dsa-4701
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html
Modified: 2024-11-21
CVE-2020-24511
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf
- https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html
- https://security.netapp.com/advisory/ntap-20210611-0005/
- https://www.debian.org/security/2021/dsa-4934
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf
- https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html
- https://security.netapp.com/advisory/ntap-20210611-0005/
- https://www.debian.org/security/2021/dsa-4934
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
Modified: 2024-11-21
CVE-2020-24512
Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf
- https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html
- https://security.netapp.com/advisory/ntap-20210611-0005/
- https://www.debian.org/security/2021/dsa-4934
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf
- https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html
- https://security.netapp.com/advisory/ntap-20210611-0005/
- https://www.debian.org/security/2021/dsa-4934
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
Modified: 2024-11-21
CVE-2020-24513
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf
- https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html
- https://www.debian.org/security/2021/dsa-4934
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf
- https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html
- https://www.debian.org/security/2021/dsa-4934
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html
Modified: 2024-11-21
CVE-2020-8694
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
- https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
Modified: 2024-11-21
CVE-2020-8695
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
- https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQ24MFBVH3HJW3PNRQBRY4YXKC7GA57W/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEM2FZWVE4FNGYNQU3WCBAWTZRBWDYUR/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
- https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQ24MFBVH3HJW3PNRQBRY4YXKC7GA57W/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEM2FZWVE4FNGYNQU3WCBAWTZRBWDYUR/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
Modified: 2024-11-21
CVE-2020-8696
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
- https://security.netapp.com/advisory/ntap-20201113-0006/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
- https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
- https://security.netapp.com/advisory/ntap-20201113-0006/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
Modified: 2024-11-21
CVE-2020-8698
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
- https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
- https://security.netapp.com/advisory/ntap-20201113-0006/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
- https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
- https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/
- https://security.netapp.com/advisory/ntap-20201113-0006/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381
Modified: 2025-05-05
CVE-2021-0127
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.
Modified: 2025-05-05
CVE-2021-0145
Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Modified: 2024-11-21
CVE-2021-0146
Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Modified: 2024-11-21
CVE-2021-24489
The Request a Quote WordPress plugin before 2.3.9 does not sanitise, validate or escape some of its settings in the admin dashboard, leading to authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.
Modified: 2025-05-05
CVE-2021-33120
Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.
Modified: 2025-05-05
CVE-2022-21151
Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- https://security.netapp.com/advisory/ntap-20220826-0003/
- https://www.debian.org/security/2022/dsa-5178
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
- https://security.netapp.com/advisory/ntap-20220826-0003/
- https://www.debian.org/security/2022/dsa-5178
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
Modified: 2024-11-21
CVE-2022-40982
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
- https://access.redhat.com/solutions/7027704
- https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
- https://downfall.page
- https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
- https://security.netapp.com/advisory/ntap-20230811-0001/
- https://www.debian.org/security/2023/dsa-5474
- https://www.debian.org/security/2023/dsa-5475
- https://xenbits.xen.org/xsa/advisory-435.html
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
- http://xenbits.xen.org/xsa/advisory-435.html
- https://access.redhat.com/solutions/7027704
- https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
- https://downfall.page
- https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
- https://security.netapp.com/advisory/ntap-20230811-0001/
- https://www.debian.org/security/2023/dsa-5474
- https://www.debian.org/security/2023/dsa-5475
- https://xenbits.xen.org/xsa/advisory-435.html
Modified: 2024-11-21
CVE-2022-41804
Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://security.netapp.com/advisory/ntap-20230915-0003/
- https://www.debian.org/security/2023/dsa-5474
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://security.netapp.com/advisory/ntap-20230915-0003/
- https://www.debian.org/security/2023/dsa-5474
Modified: 2025-01-07
CVE-2023-23583
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
- http://www.openwall.com/lists/oss-security/2023/11/14/4
- http://www.openwall.com/lists/oss-security/2023/11/14/5
- http://www.openwall.com/lists/oss-security/2023/11/14/6
- http://www.openwall.com/lists/oss-security/2023/11/14/7
- http://www.openwall.com/lists/oss-security/2023/11/14/8
- http://www.openwall.com/lists/oss-security/2023/11/14/9
- https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20231116-0015/
- https://www.debian.org/security/2023/dsa-5563
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
- http://www.openwall.com/lists/oss-security/2023/11/14/4
- http://www.openwall.com/lists/oss-security/2023/11/14/5
- http://www.openwall.com/lists/oss-security/2023/11/14/6
- http://www.openwall.com/lists/oss-security/2023/11/14/7
- http://www.openwall.com/lists/oss-security/2023/11/14/8
- http://www.openwall.com/lists/oss-security/2023/11/14/9
- https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20231116-0015/
- https://www.debian.org/security/2023/dsa-5563
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
Modified: 2024-11-21
CVE-2023-23908
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://security.netapp.com/advisory/ntap-20230824-0003/
- https://www.debian.org/security/2023/dsa-5474
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://security.netapp.com/advisory/ntap-20230824-0003/
- https://www.debian.org/security/2023/dsa-5474