[Git][security-tracker-team/security-tracker][master] intel-microcode fixed in sid
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Feb 25 13:47:15 GMT 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e800b87c by Moritz Muehlenhoff at 2022-02-25T14:44:30+01:00
intel-microcode fixed in sid
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -49178,7 +49178,7 @@ CVE-2021-33122
CVE-2021-33121
RESERVED
CVE-2021-33120 (Out of bounds read under complex microarchitectural condition in memor ...)
- - intel-microcode <unfixed>
+ - intel-microcode 3.20220207.1
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
@@ -94874,7 +94874,7 @@ CVE-2021-0146 (Hardware allows activation of test or debug logic at runtime for
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207
CVE-2021-0145 (Improper initialization of shared resources in some Intel(R) Processor ...)
- - intel-microcode <unfixed>
+ - intel-microcode 3.20220207.1
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
@@ -94920,7 +94920,7 @@ CVE-2021-0129 (Improper access control in BlueZ may allow an authenticated user
CVE-2021-0128
RESERVED
CVE-2021-0127 (Insufficient control flow management in some Intel(R) Processors may a ...)
- - intel-microcode <unfixed>
+ - intel-microcode 3.20220207.1
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e800b87cf72afceeb69ac087caca1ed8d5a15222
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e800b87cf72afceeb69ac087caca1ed8d5a15222
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220225/c1a902c7/attachment.htm>
More information about the debian-security-tracker-commits
mailing list