[Git][security-tracker-team/security-tracker][master] intel-microcode fixed in sid

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Feb 25 13:47:15 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e800b87c by Moritz Muehlenhoff at 2022-02-25T14:44:30+01:00
intel-microcode fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -49178,7 +49178,7 @@ CVE-2021-33122
 CVE-2021-33121
 	RESERVED
 CVE-2021-33120 (Out of bounds read under complex microarchitectural condition in memor ...)
-	- intel-microcode <unfixed>
+	- intel-microcode 3.20220207.1
 	[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
 	[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
@@ -94874,7 +94874,7 @@ CVE-2021-0146 (Hardware allows activation of test or debug logic at runtime for
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207
 CVE-2021-0145 (Improper initialization of shared resources in some Intel(R) Processor ...)
-	- intel-microcode <unfixed>
+	- intel-microcode 3.20220207.1
 	[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
 	[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
@@ -94920,7 +94920,7 @@ CVE-2021-0129 (Improper access control in BlueZ may allow an authenticated user
 CVE-2021-0128
 	RESERVED
 CVE-2021-0127 (Insufficient control flow management in some Intel(R) Processors may a ...)
-	- intel-microcode <unfixed>
+	- intel-microcode 3.20220207.1
 	[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
 	[buster] - intel-microcode <postponed> (Wait until exposed in unstable; tendency point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e800b87cf72afceeb69ac087caca1ed8d5a15222

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e800b87cf72afceeb69ac087caca1ed8d5a15222
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220225/c1a902c7/attachment.htm>


More information about the debian-security-tracker-commits mailing list