Latest intel xeon e-2104g Vulnerabilities

Xen Security Advisory 435 v1 (CVE-2022-40982) - x86/Intel: Gather Data Sampling
debian/intel-microcode<=3.20230214.1~deb11u1<=3.20230512.1<=3.20220510.1~deb11u1
Redhat Enterprise Linux=6.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
Xen Xen
and 2772 more
Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical ac...
Intel Celeron G5205u Firmware
Intel Celeron G5205u
Intel Celeron G5305u Firmware
Intel Celeron G5305u
Intel Celeron G5900 Firmware
Intel Celeron G5900
and 912 more
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 533 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 562 more
Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 546 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 540 more
Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 542 more
Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via lo...
Apple macOS Catalina<10.15.4
Apple Mojave
Apple High Sierra
ubuntu/linux<4.15.0-76.86
ubuntu/linux<5.3.0-29.31
ubuntu/linux<5.5~
and 1742 more
Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access.
Intel Xeon E3-1585 Firmware
Intel Xeon E3-1585=5
Intel Xeon E3-1585l Firmware
Intel Xeon E3-1585l=5
Intel Xeon E3-1578l Firmware
Intel Xeon E3-1578l=5
and 533 more
A flaw was found in computer hardware of the Intel microprocessors related to the instruction-side TLB (Translation Lookaside Buffer) that caches translations from guest (and host) virtual addresses i...
redhat/kernel<0:2.6.32-754.24.2.el6
redhat/kernel<0:2.6.32-431.96.3.el6
redhat/kernel<0:2.6.32-504.81.3.el6
redhat/kernel-rt<0:3.10.0-1062.4.2.rt56.1028.el7
redhat/kernel<0:3.10.0-1062.4.2.el7
redhat/kernel<0:3.10.0-327.82.2.el7
and 3213 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203