summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-02-25 14:43:59 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2022-02-25 14:44:30 +0100
commite800b87cf72afceeb69ac087caca1ed8d5a15222 (patch)
treeb6c17305a955e4f543e041b7d51b9e287cc44151
parent46958a94a3e35119b3747d1fc83e4093d15efaa1 (diff)
intel-microcode fixed in sid
-rw-r--r--data/CVE/list6
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 87676c14d1..f347037776 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -49178,7 +49178,7 @@ CVE-2021-33122
CVE-2021-33121
RESERVED
CVE-2021-33120 (Out of bounds read under complex microarchitectural condition in memor ...)
- - intel-microcode <unfixed>
+ - intel-microcode 3.20220207.1
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
@@ -94874,7 +94874,7 @@ CVE-2021-0146 (Hardware allows activation of test or debug logic at runtime for
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207
CVE-2021-0145 (Improper initialization of shared resources in some Intel(R) Processor ...)
- - intel-microcode <unfixed>
+ - intel-microcode 3.20220207.1
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
@@ -94920,7 +94920,7 @@ CVE-2021-0129 (Improper access control in BlueZ may allow an authenticated user
CVE-2021-0128
RESERVED
CVE-2021-0127 (Insufficient control flow management in some Intel(R) Processors may a ...)
- - intel-microcode <unfixed>
+ - intel-microcode 3.20220207.1
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html

© 2014-2024 Faster IT GmbH | imprint | privacy policy