public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Special register buffer data sampling (CVE-2020-0543) on new mini system
@ 2025-09-27 13:01 Adolf Belka
  0 siblings, 0 replies; only message in thread
From: Adolf Belka @ 2025-09-27 13:01 UTC (permalink / raw)
  To: IPFire: Development-List

Hi All,

Something I noticed. The new mini system is showing "Vulnerable - No microcode" for the "Special register buffer data sampling (CVE-2020-0543)" vulnerability.

However when I go and look at the Intel site for vulnerabilities versus CPU then for the Celeron J series and CVE-2020-0543 it shows Not Affected.

The vulnerability would need the attacker to have local access to the system and be authenticated, which would mean logged in as root so then you would have already lost big time as they could access anything but it just puzzled me why it is shown as Vulnerable. I presume that this comes from info from Intel that is in the kernel.

Regards,

Adolf.


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2025-09-27 13:01 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-09-27 13:01 Special register buffer data sampling (CVE-2020-0543) on new mini system Adolf Belka

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox