{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>Intel SSD Tools software versions ant\u00e9rieures \u00e0 mdadm-4.2-rc2</li> <li>Intel BIOS PCSD BIOS versions ant\u00e9rieures \u00e0 02.01.0013</li> <li>Intel logiciel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.200</li> <li>Intel Converged Security Management Engine (CSME) sans les correctifs de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>Intel Active Management Technology (AMT) sans les correctifs de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>Intel Standard Manageability software sans les correctifs de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>Pilote RDMA des Contr\u00f4leurs Ethernet Intel pour linux versions ant\u00e9rieures \u00e0 1.9.30</li> <li>Programme d'installation de pilotes Intel RST avec Intel Optane Memory (plateformes de 11\u00e8me \u00e0 13\u00e8me g\u00e9n\u00e9rations) versions ant\u00e9rieures \u00e0 19.5.2.1049.5</li> <li>Programme d'installation de pilotes Intel RST avec Intel Optane Memory (plateformes de 10\u00e8me et 11\u00e8me g\u00e9n\u00e9rations) versions ant\u00e9rieures \u00e0 18.7.6.1010.3</li> <li>Programme d'installation de pilotes Intel RST avec Intel Optane Memory (plateformes de 8\u00e8me et 9\u00e8me g\u00e9n\u00e9rations) versions ant\u00e9rieures \u00e0 17.11.3.1010.2</li> <li>Interface utilisateur Intel RST et pilotes versions ant\u00e9rieures \u00e0 16.8.5.1014.5</li> <li>Suite de logiciels Intel Quartus Prime Pro pour Linux before versions ant\u00e9rieures \u00e0 22.4</li> <li>Suite de logiciels Intel Quartus Prime Standard pour Linux versions ant\u00e9rieures \u00e0 22.1STD</li> <li>Cartes graphiques Intel Arc A770 et A750 vendues entre octobre 2022 et d\u00e9cembre 2022</li> <li>S\u00e9ries de processeurs Intel Atom, Xeon, Core de 7\u00e8me \u00e0 11\u00e8me g\u00e9n\u00e9rations, Celeron, Pentium et Core s\u00e9ries X sans les correctifs de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>Logiciel d'ex\u00e9cution Intel oneVPL GPU versions ant\u00e9rieures \u00e0 22.6.5</li> <li>Client Intel Unite pour Mac versions ant\u00e9rieures \u00e0 4.2.11</li> <li>Ensemble de logiciels Intel Unite pour Windows versions ant\u00e9rieures \u00e0 4.2.34962</li> <li>S\u00e9ries de processeurs Intel Atom, Xeon, Core, Celeron et Pentium sans les correctifs de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>Pilotes infrarouge ITE Tech consumer pour terminaux NUC versions ant\u00e9rieures \u00e0 5.5.2.1</li> <li>System Firmware Update Utility (SysFwUpdt) for Intel Server Boards and Intel Server Systems Based on Intel 621A Chipset before version 16.0.7.</li> <li>Utilitaire de mise \u00e0 jour de microgiciel (SysFwUpdt) pour Intel Server Boards et Intel Server Systems bas\u00e9 sur les jeux de puces 621A</li> <li>S\u00e9ries de contr\u00f4leurs Ethernet et adaptateurs E810 (Columbiaville) versions ant\u00e9rieures \u00e0 1.7.2.4</li> <li>Logiciel Intel Optimization for TensorFlow versions ant\u00e9rieures \u00e0 2.12</li> <li>Distribution Intel des outils OpenVINO versions ant\u00e9rieures \u00e0 2022.3.0</li> <li>Outils Intel VCUST t\u00e9l\u00e9charg\u00e9s avant le 03 f\u00e9vrier 2023 sans le correctif de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>logiciel Intel VROC versions ant\u00e9rieures \u00e0 8.0.0.4035</li> <li>Logiciel d'installation d'Intel Advanced Link Analyzer Standard Edition versions ant\u00e9rieures \u00e0 22.1.1</li> <li>Logiciel d'installation Intel ISPC software pour Windows versions ant\u00e9rieures \u00e0 1.19.0</li> <li>Logiciel Intel Agilex software inclus dans Intel Quartus Prime Pro Edition pour Linux versions ant\u00e9rieures \u00e0 22.4</li> <li>Logiciel Intel Easy Streaming Wizard toutes versions [1]</li> <li>Application Android Intel Support versions ant\u00e9rieures \u00e0 v23.02.07</li> <li>Suite logicielle Intel NUC Pro pour Windows versions ant\u00e9rieures \u00e0 2.0.0.9</li> <li>Logiciel Intel PROSet/Wireless WiFi 6 AX200 sur certaines plateformes Microsoft Surface versions ant\u00e9rieures \u00e0 22.220 HF</li> <li>Logiciel Intel oneMKL versions ant\u00e9rieures \u00e0 2022.0</li> <li>Logiciel Intel DTT versions ant\u00e9rieures \u00e0 8.7.10801.25109</li> <li>Logiciel Intel AI Hackathon versions ant\u00e9rieures \u00e0 2.0.0</li> <li>Logiciel Intel DSA versions ant\u00e9rieures \u00e0 23.1.9</li> <li>Biblioth\u00e8que Hyperscan maintenue par Intel versions ant\u00e9rieures \u00e0 5.4.1</li> <li>Outils Intel oneAPI versions ant\u00e9rieures \u00e0 2023.1.0</li> <li>BIOS de cartes m\u00e8res de terminaux NUC sans les correctifs de s\u00e9curit\u00e9 du 08 ao\u00fbt 2023</li> <li>Logiciel Intel Manageability Commander versions ant\u00e9rieures \u00e0 2.3</li> <li>Logiciel Intel Unison versions ant\u00e9rieures \u00e0 10.12</li> <li>Pilotes vid\u00e9o BMC int\u00e9gr\u00e9s aux cartes m\u00e8res Intel M10JNP2SB pour Microsoft versions ant\u00e9rieures \u00e0 3.0</li> <li>Pilotes vid\u00e9o BMC int\u00e9gr\u00e9s aux cartes m\u00e8res Intel M10JNP2SB pour Linux versions ant\u00e9rieures \u00e0 1.13.4</li> <li>Logiciel Intel SDP Tool versions ant\u00e9rieures \u00e0 1.4 build 5</li> <li>Outils de d\u00e9veloppement Intel PSR versions ant\u00e9rieures \u00e0 1.0.0.20</li> <li>Logiciel Intel RealSense ID pour Intel RealSense 450 FA versions ant\u00e9rieures \u00e0 0.25</li> <li>Application Android Intel Unite versions ant\u00e9rieures \u00e0 4.2.3504</li> <li>Logiciel MAVinci Desktop pour Intel Falcon 8+ toutes versions [2]</li> <li>Logiciel Intel ITS versions ant\u00e9rieures \u00e0 3.1</li> <li>Outils de d\u00e9veloppement Intel RealSense versions ant\u00e9rieures \u00e0 2.53.1</li> </ul> <p>[1] :\u00a0L'\u00e9diteur indique que le logiciel Intel Easy Streaming Wizard n'est plus maintenu et recommande de le d\u00e9sinstaller ou de cesser de l'utiliser d\u00e8s que possible</p> <p>[2] :\u00a0L'\u00e9diteur indique que le logiciel MAVinci Desktop pour Intel Falcon 8+ n'est plus maintenu et recommande de le d\u00e9sinstaller ou de cesser de l'utiliser d\u00e8s que possible</p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-32617","url":"https://www.cve.org/CVERecord?id=CVE-2023-32617"},{"name":"CVE-2023-27509","url":"https://www.cve.org/CVERecord?id=CVE-2023-27509"},{"name":"CVE-2023-31246","url":"https://www.cve.org/CVERecord?id=CVE-2023-31246"},{"name":"CVE-2023-23577","url":"https://www.cve.org/CVERecord?id=CVE-2023-23577"},{"name":"CVE-2022-44611","url":"https://www.cve.org/CVERecord?id=CVE-2022-44611"},{"name":"CVE-2023-28736","url":"https://www.cve.org/CVERecord?id=CVE-2023-28736"},{"name":"CVE-2023-29243","url":"https://www.cve.org/CVERecord?id=CVE-2023-29243"},{"name":"CVE-2023-34086","url":"https://www.cve.org/CVERecord?id=CVE-2023-34086"},{"name":"CVE-2023-27392","url":"https://www.cve.org/CVERecord?id=CVE-2023-27392"},{"name":"CVE-2023-24016","url":"https://www.cve.org/CVERecord?id=CVE-2023-24016"},{"name":"CVE-2022-27635","url":"https://www.cve.org/CVERecord?id=CVE-2022-27635"},{"name":"CVE-2023-28823","url":"https://www.cve.org/CVERecord?id=CVE-2023-28823"},{"name":"CVE-2023-22356","url":"https://www.cve.org/CVERecord?id=CVE-2023-22356"},{"name":"CVE-2023-27506","url":"https://www.cve.org/CVERecord?id=CVE-2023-27506"},{"name":"CVE-2023-32547","url":"https://www.cve.org/CVERecord?id=CVE-2023-32547"},{"name":"CVE-2022-36372","url":"https://www.cve.org/CVERecord?id=CVE-2022-36372"},{"name":"CVE-2023-25773","url":"https://www.cve.org/CVERecord?id=CVE-2023-25773"},{"name":"CVE-2023-28658","url":"https://www.cve.org/CVERecord?id=CVE-2023-28658"},{"name":"CVE-2022-37343","url":"https://www.cve.org/CVERecord?id=CVE-2022-37343"},{"name":"CVE-2022-36392","url":"https://www.cve.org/CVERecord?id=CVE-2022-36392"},{"name":"CVE-2023-27515","url":"https://www.cve.org/CVERecord?id=CVE-2023-27515"},{"name":"CVE-2022-38076","url":"https://www.cve.org/CVERecord?id=CVE-2022-38076"},{"name":"CVE-2023-27391","url":"https://www.cve.org/CVERecord?id=CVE-2023-27391"},{"name":"CVE-2022-37336","url":"https://www.cve.org/CVERecord?id=CVE-2022-37336"},{"name":"CVE-2023-28385","url":"https://www.cve.org/CVERecord?id=CVE-2023-28385"},{"name":"CVE-2023-25944","url":"https://www.cve.org/CVERecord?id=CVE-2023-25944"},{"name":"CVE-2023-29500","url":"https://www.cve.org/CVERecord?id=CVE-2023-29500"},{"name":"CVE-2023-22841","url":"https://www.cve.org/CVERecord?id=CVE-2023-22841"},{"name":"CVE-2022-38102","url":"https://www.cve.org/CVERecord?id=CVE-2022-38102"},{"name":"CVE-2023-22444","url":"https://www.cve.org/CVERecord?id=CVE-2023-22444"},{"name":"CVE-2023-32609","url":"https://www.cve.org/CVERecord?id=CVE-2023-32609"},{"name":"CVE-2023-28938","url":"https://www.cve.org/CVERecord?id=CVE-2023-28938"},{"name":"CVE-2023-28711","url":"https://www.cve.org/CVERecord?id=CVE-2023-28711"},{"name":"CVE-2023-28714","url":"https://www.cve.org/CVERecord?id=CVE-2023-28714"},{"name":"CVE-2023-22276","url":"https://www.cve.org/CVERecord?id=CVE-2023-22276"},{"name":"CVE-2023-33867","url":"https://www.cve.org/CVERecord?id=CVE-2023-33867"},{"name":"CVE-2022-29871","url":"https://www.cve.org/CVERecord?id=CVE-2022-29871"},{"name":"CVE-2022-40982","url":"https://www.cve.org/CVERecord?id=CVE-2022-40982"},{"name":"CVE-2022-29887","url":"https://www.cve.org/CVERecord?id=CVE-2022-29887"},{"name":"CVE-2023-32656","url":"https://www.cve.org/CVERecord?id=CVE-2023-32656"},{"name":"CVE-2023-22449","url":"https://www.cve.org/CVERecord?id=CVE-2023-22449"},{"name":"CVE-2023-25757","url":"https://www.cve.org/CVERecord?id=CVE-2023-25757"},{"name":"CVE-2023-25182","url":"https://www.cve.org/CVERecord?id=CVE-2023-25182"},{"name":"CVE-2022-29470","url":"https://www.cve.org/CVERecord?id=CVE-2022-29470"},{"name":"CVE-2023-29494","url":"https://www.cve.org/CVERecord?id=CVE-2023-29494"},{"name":"CVE-2023-28380","url":"https://www.cve.org/CVERecord?id=CVE-2023-28380"},{"name":"CVE-2022-41984","url":"https://www.cve.org/CVERecord?id=CVE-2022-41984"},{"name":"CVE-2023-22840","url":"https://www.cve.org/CVERecord?id=CVE-2023-22840"},{"name":"CVE-2022-40964","url":"https://www.cve.org/CVERecord?id=CVE-2022-40964"},{"name":"CVE-2023-34355","url":"https://www.cve.org/CVERecord?id=CVE-2023-34355"},{"name":"CVE-2022-38973","url":"https://www.cve.org/CVERecord?id=CVE-2022-38973"},{"name":"CVE-2022-34657","url":"https://www.cve.org/CVERecord?id=CVE-2022-34657"},{"name":"CVE-2023-29151","url":"https://www.cve.org/CVERecord?id=CVE-2023-29151"},{"name":"CVE-2022-43505","url":"https://www.cve.org/CVERecord?id=CVE-2022-43505"},{"name":"CVE-2022-36351","url":"https://www.cve.org/CVERecord?id=CVE-2022-36351"},{"name":"CVE-2023-34438","url":"https://www.cve.org/CVERecord?id=CVE-2023-34438"},{"name":"CVE-2023-28405","url":"https://www.cve.org/CVERecord?id=CVE-2023-28405"},{"name":"CVE-2023-34427","url":"https://www.cve.org/CVERecord?id=CVE-2023-34427"},{"name":"CVE-2023-32663","url":"https://www.cve.org/CVERecord?id=CVE-2023-32663"},{"name":"CVE-2022-41804","url":"https://www.cve.org/CVERecord?id=CVE-2022-41804"},{"name":"CVE-2022-45112","url":"https://www.cve.org/CVERecord?id=CVE-2022-45112"},{"name":"CVE-2023-27505","url":"https://www.cve.org/CVERecord?id=CVE-2023-27505"},{"name":"CVE-2023-33877","url":"https://www.cve.org/CVERecord?id=CVE-2023-33877"},{"name":"CVE-2023-22330","url":"https://www.cve.org/CVERecord?id=CVE-2023-22330"},{"name":"CVE-2023-27887","url":"https://www.cve.org/CVERecord?id=CVE-2023-27887"},{"name":"CVE-2022-43456","url":"https://www.cve.org/CVERecord?id=CVE-2022-43456"},{"name":"CVE-2023-32285","url":"https://www.cve.org/CVERecord?id=CVE-2023-32285"},{"name":"CVE-2022-46329","url":"https://www.cve.org/CVERecord?id=CVE-2022-46329"},{"name":"CVE-2023-32543","url":"https://www.cve.org/CVERecord?id=CVE-2023-32543"},{"name":"CVE-2023-34349","url":"https://www.cve.org/CVERecord?id=CVE-2023-34349"},{"name":"CVE-2023-22338","url":"https://www.cve.org/CVERecord?id=CVE-2023-22338"},{"name":"CVE-2023-26587","url":"https://www.cve.org/CVERecord?id=CVE-2023-26587"},{"name":"CVE-2023-30760","url":"https://www.cve.org/CVERecord?id=CVE-2023-30760"},{"name":"CVE-2022-44612","url":"https://www.cve.org/CVERecord?id=CVE-2022-44612"},{"name":"CVE-2023-25775","url":"https://www.cve.org/CVERecord?id=CVE-2023-25775"},{"name":"CVE-2022-27879","url":"https://www.cve.org/CVERecord?id=CVE-2022-27879"},{"name":"CVE-2022-25864","url":"https://www.cve.org/CVERecord?id=CVE-2022-25864"},{"name":"CVE-2023-23908","url":"https://www.cve.org/CVERecord?id=CVE-2023-23908"},{"name":"CVE-2022-38083","url":"https://www.cve.org/CVERecord?id=CVE-2022-38083"}],"links":[],"reference":"CERTFR-2023-AVI-0640","revisions":[{"description":"Version initiale","revision_date":"2023-08-09T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00846 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00846.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00844 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00844.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00897 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00897.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00893 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00893.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00899 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00899.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00828 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00813 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00912 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00859 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00859.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00932 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00932.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00812 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00812.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00892 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00934 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00934.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00795 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00795.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00938 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00938.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00826 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00826.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00862 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00862.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00818 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00818.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00836 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00840 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00840.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00873 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00873.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00742 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00794 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00766 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00879 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00905 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00905.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00837 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00783 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00830 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00830.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00842 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00842.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00877 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00877.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00848 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00848.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00829 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00829.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00917 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00946 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00946.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00800 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00800.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00890 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00890.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00850 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00850.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00849 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00849.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00868 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00868.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00878 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00878.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00907 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00907.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00690 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00875 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00875.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00872 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00835 du 08 ao\u00fbt 2023","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00835.html"}]}
