diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-02-25 14:43:59 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-02-25 14:44:30 +0100 |
commit | e800b87cf72afceeb69ac087caca1ed8d5a15222 (patch) | |
tree | b6c17305a955e4f543e041b7d51b9e287cc44151 | |
parent | 46958a94a3e35119b3747d1fc83e4093d15efaa1 (diff) |
intel-microcode fixed in sid
-rw-r--r-- | data/CVE/list | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/list b/data/CVE/list index 87676c14d1..f347037776 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -49178,7 +49178,7 @@ CVE-2021-33122 CVE-2021-33121 RESERVED CVE-2021-33120 (Out of bounds read under complex microarchitectural condition in memor ...) - - intel-microcode <unfixed> + - intel-microcode 3.20220207.1 [bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release) [buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html @@ -94874,7 +94874,7 @@ CVE-2021-0146 (Hardware allows activation of test or debug logic at runtime for NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207 CVE-2021-0145 (Improper initialization of shared resources in some Intel(R) Processor ...) - - intel-microcode <unfixed> + - intel-microcode 3.20220207.1 [bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release) [buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html @@ -94920,7 +94920,7 @@ CVE-2021-0129 (Improper access control in BlueZ may allow an authenticated user CVE-2021-0128 RESERVED CVE-2021-0127 (Insufficient control flow management in some Intel(R) Processors may a ...) - - intel-microcode <unfixed> + - intel-microcode 3.20220207.1 [bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release) [buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html |