Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e800b87c by Moritz Muehlenhoff at 2022-02-25T14:44:30+01:00
intel-microcode fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -49178,7 +49178,7 @@ CVE-2021-33122
 CVE-2021-33121
        RESERVED
 CVE-2021-33120 (Out of bounds read under complex microarchitectural condition 
in memor ...)
-       - intel-microcode <unfixed>
+       - intel-microcode 3.20220207.1
        [bullseye] - intel-microcode <postponed> (Wait until exposed in 
unstable; tendency to point release)
        [buster] - intel-microcode <postponed> (Wait until exposed in unstable; 
tendency point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
@@ -94874,7 +94874,7 @@ CVE-2021-0146 (Hardware allows activation of test or 
debug logic at runtime for
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207
 CVE-2021-0145 (Improper initialization of shared resources in some Intel(R) 
Processor ...)
-       - intel-microcode <unfixed>
+       - intel-microcode 3.20220207.1
        [bullseye] - intel-microcode <postponed> (Wait until exposed in 
unstable; tendency to point release)
        [buster] - intel-microcode <postponed> (Wait until exposed in unstable; 
tendency point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
@@ -94920,7 +94920,7 @@ CVE-2021-0129 (Improper access control in BlueZ may 
allow an authenticated user
 CVE-2021-0128
        RESERVED
 CVE-2021-0127 (Insufficient control flow management in some Intel(R) 
Processors may a ...)
-       - intel-microcode <unfixed>
+       - intel-microcode 3.20220207.1
        [bullseye] - intel-microcode <postponed> (Wait until exposed in 
unstable; tendency to point release)
        [buster] - intel-microcode <postponed> (Wait until exposed in unstable; 
tendency point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e800b87cf72afceeb69ac087caca1ed8d5a15222

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e800b87cf72afceeb69ac087caca1ed8d5a15222
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to