diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2020-06-10 06:06:54 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2020-06-10 06:06:54 +0200 |
commit | 18cc9e0b1a73cb61659d7ebcdf4087b6317d79d4 (patch) | |
tree | f0edcda03fbb0d978e025739f85894f6b379343d /data | |
parent | 54ea2c673612b14f822943a26f92fb2b7c6a353b (diff) |
Remove postponed entries for intel-microcode
Diffstat (limited to 'data')
-rw-r--r-- | data/CVE/list | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/data/CVE/list b/data/CVE/list index e960f03e30..f9973ca3e9 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -37226,17 +37226,11 @@ CVE-2020-0550 (Improper data forwarding in some data cache for some Intel(R) Pro NOTE: https://software.intel.com/security-software-guidance/insights/processors-affected-snoop-assisted-l1-data-sampling CVE-2020-0549 (Cleanup errors in some data cache evictions for some Intel(R) Processo ...) - intel-microcode 3.20200609.1 - [buster] - intel-microcode <postponed> (Minor issue; low impact if all mitigations for TAA and MDS were already previously applied) - [stretch] - intel-microcode <postponed> (Minor issue; low impact if all mitigations for TAA and MDS were already previously applied) - [jessie] - intel-microcode <postponed> (Minor issue; low impact if all mitigations for TAA and MDS were already previously applied) NOTE: https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling NOTE: https://cacheoutattack.com/ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html CVE-2020-0548 (Cleanup errors in some Intel(R) Processors may allow an authenticated ...) - intel-microcode 3.20200609.1 - [buster] - intel-microcode <postponed> (Minor issue; low impact if all mitigations for TAA and MDS were already previously applied) - [stretch] - intel-microcode <postponed> (Minor issue; low impact if all mitigations for TAA and MDS were already previously applied) - [jessie] - intel-microcode <postponed> (Minor issue; low impact if all mitigations for TAA and MDS were already previously applied) NOTE: https://software.intel.com/security-software-guidance/software-guidance/vector-register-sampling NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html CVE-2020-0547 (Incorrect default permissions in the installer for Intel(R) Data Migra ...) |