[DSA-4701-1] intel-microcode
Severity
Medium
Affected Packages
2
CVEs
3
security update
no info
Package | Affected Version |
---|---|
pkg:deb/debian/intel-microcode?distro=stretch | < 3.20200609.2~deb9u1 |
pkg:deb/debian/intel-microcode?distro=buster | < 3.20200609.2~deb10u1 |
- ID
- DSA-4701-1
- Severity
- medium
- Severity from
- CVE-2020-0543
- URL
- https://www.debian.org/security/dsa-4701-1
- Published
-
2020-06-11T00:00:00
(4 years ago) - Modified
-
2020-06-11T00:00:00
(4 years ago) - Other Advisories
-
- ALAS-2020-1396
- ALAS-2020-1401
- ALAS2-2020-1444
- ALAS2-2020-1465
- ALPINE:CVE-2020-0543
- ALPINE:CVE-2020-0548
- ALSA-2021:3027
- ASA-202006-10
- DSA-4698-1
- DSA-4699-1
- ELSA-2020-2431
- ELSA-2020-2432
- ELSA-2020-2433
- ELSA-2020-5714
- ELSA-2020-5715
- ELSA-2020-5722
- ELSA-2020-5732
- ELSA-2020-5750
- ELSA-2020-5755
- ELSA-2020-5756
- ELSA-2021-3027
- ELSA-2021-3028
- FEDORA-2020-11ddbfbdf0
- FEDORA-2020-1afbe7ba2d
- FEDORA-2020-3364913ace
- FEDORA-2020-e47d28bc2b
- FEDORA-2020-e8835a5f8e
- FREEBSD:FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3
- openSUSE-SU-2020:0791-1
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2020:0818-1
- openSUSE-SU-2020:0965-1
- openSUSE-SU-2020:0985-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:2431
- RHSA-2020:2432
- RHSA-2020:2433
- RHSA-2021:3027
- RHSA-2021:3028
- SSA:2020-163-01
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1589-1
- SUSE-SU-2020:1595-1
- SUSE-SU-2020:1596-1
- SUSE-SU-2020:1597-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1600-1
- SUSE-SU-2020:1601-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1609-1
- SUSE-SU-2020:1630-1
- SUSE-SU-2020:1632-1
- SUSE-SU-2020:1633-1
- SUSE-SU-2020:1634-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:1887-1
- SUSE-SU-2020:1889-1
- SUSE-SU-2020:1902-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2822-1
- SUSE-SU-2021:1497-1
- USN-4385-1
- USN-4387-1
- USN-4388-1
- USN-4389-1
- USN-4390-1
- USN-4391-1
- USN-4392-1
- USN-4393-1
- USN-5617-1
- XSA-320
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2020-0543 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543 | |
CVE | CVE-2020-0548 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548 | |
CVE | CVE-2020-0549 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/debian/intel-microcode?distro=stretch | debian | intel-microcode | < 3.20200609.2~deb9u1 | stretch | ||
Affected | pkg:deb/debian/intel-microcode?distro=buster | debian | intel-microcode | < 3.20200609.2~deb10u1 | buster |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |