summaryrefslogtreecommitdiffstats
path: root/data
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-06-11 06:12:36 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-06-11 06:12:36 +0200
commit67e86969cb95b3a46112a8085148fcb671b0b3f1 (patch)
tree7c566d2fa9acf549d1c88cea489e3c19ff513876 /data
parenta320aaf0ea414ad7d6a93420aa155746dd505162 (diff)
Add references for CVE-2021-0089 / CVE-2021-26313 and CVE-2021-0086 / CVE-2021-26314
Diffstat (limited to 'data')
-rw-r--r--data/CVE/list8
1 files changed, 8 insertions, 0 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 5e610533a1..e77d0ce959 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -19531,11 +19531,15 @@ CVE-2021-26316
CVE-2021-26315
RESERVED
CVE-2021-26314 (Potential floating point value injection in all supported CPU products ...)
+ NOTE: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003
+ NOTE: Claimed to not affect Xen, Cf. https://xenbits.xen.org/xsa/advisory-375.html in
+ NOTE: ("NOTE CONCERNING CVE-2021-0086 / CVE-2021-26314").
TODO: check
CVE-2021-26313 (Potential speculative code store bypass in all supported CPU products, ...)
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-375.html
+ NOTE: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003
CVE-2021-26312
RESERVED
CVE-2021-26311 (In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest a ...)
@@ -46863,11 +46867,15 @@ CVE-2021-0089 (Observable response discrepancy in some Intel(R) Processors may a
- xen <unfixed>
[stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-375.html
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html
CVE-2021-0088
RESERVED
CVE-2021-0087
RESERVED
CVE-2021-0086 (Improper permissions in the installer for the Intel(R) Brand Verificat ...)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00546.html
+ NOTE: Claimed to not affect Xen, Cf. https://xenbits.xen.org/xsa/advisory-375.html in
+ NOTE: ("NOTE CONCERNING CVE-2021-0086 / CVE-2021-26314").
TODO: check
CVE-2021-0085
RESERVED

© 2014-2024 Faster IT GmbH | imprint | privacy policy