Latest intel pentium gold g5400 firmware Vulnerabilities

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
Intel Atom X6200fe Firmware
Intel Atom X6200fe
Intel Atom X6211e Firmware
Intel Atom X6211e
Intel Atom X6212re Firmware
Intel Atom X6212re
and 1252 more
Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
Intel Atom X6200fe Firmware
Intel Atom X6200fe
Intel Atom X6211e Firmware
Intel Atom X6211e
Intel Atom X6212re Firmware
Intel Atom X6212re
and 1252 more
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel Pentium J6426 Firmware
Intel Pentium J6426
Intel Pentium J4205 Firmware
Intel Pentium J4205
Intel Pentium J3710 Firmware
Intel Pentium J3710
and 1806 more
Xen Security Advisory 435 v1 (CVE-2022-40982) - x86/Intel: Gather Data Sampling
debian/intel-microcode<=3.20230214.1~deb11u1<=3.20230512.1<=3.20220510.1~deb11u1
Redhat Enterprise Linux=6.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
Xen Xen
and 2772 more
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Core I7-11850he Firmware
Intel Core I7-11850he
Intel Core I7-11600h Firmware
Intel Core I7-11600h
Intel Core I7-11390h Firmware
Intel Core I7-11390h
and 928 more
Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Celeron 1000m Firmware
Intel Celeron 1000m
Intel Celeron 1005m Firmware
Intel Celeron 1005m
Intel Celeron 1007u Firmware
Intel Celeron 1007u
and 888 more
Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical ac...
Intel Celeron G5205u Firmware
Intel Celeron G5205u
Intel Celeron G5305u Firmware
Intel Celeron G5305u
Intel Celeron G5900 Firmware
Intel Celeron G5900
and 912 more
Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enabl...
Intel Core I3-12100 Firmware<16.0.15
Intel Core I3-12100
Intel Core I3-12100f Firmware<16.0.15
Intel Core I3-12100f
Intel Core I3-12100t Firmware<16.0.15
Intel Core I3-12100t
and 790 more
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Core I7-8510y Firmware
Intel Core I7-8510y
Intel Core I7-8500y Firmware
Intel Core I7-8500y
Intel Core I5-8310y Firmware
Intel Core I5-8310y
and 592 more
A vulnerability was found in Intel's implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX e...
Intel Core I7-8510y Firmware
Intel Core I7-8510y
Intel Core I7-8500y Firmware
Intel Core I7-8500y
Intel Core I5-8310y Firmware
Intel Core I5-8310y
and 596 more
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gol...
redhat/kernel<0:2.6.32-754.24.3.el6
redhat/kernel-rt<0:3.10.0-1062.4.3.rt56.1029.el7
redhat/kernel<0:3.10.0-1062.4.3.el7
redhat/kernel<0:3.10.0-327.82.2.el7
redhat/kernel<0:3.10.0-514.70.3.el7
redhat/kernel<0:3.10.0-693.60.3.el7
and 1512 more
A flaw was found in computer hardware of the Intel microprocessors related to the instruction-side TLB (Translation Lookaside Buffer) that caches translations from guest (and host) virtual addresses i...
redhat/kernel<0:2.6.32-754.24.2.el6
redhat/kernel<0:2.6.32-431.96.3.el6
redhat/kernel<0:2.6.32-504.81.3.el6
redhat/kernel-rt<0:3.10.0-1062.4.2.rt56.1028.el7
redhat/kernel<0:3.10.0-1062.4.2.el7
redhat/kernel<0:3.10.0-327.82.2.el7
and 3213 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203