* Special register buffer data sampling (CVE-2020-0543) on new mini system
@ 2025-09-27 13:01 Adolf Belka
0 siblings, 0 replies; only message in thread
From: Adolf Belka @ 2025-09-27 13:01 UTC (permalink / raw)
To: IPFire: Development-List
Hi All,
Something I noticed. The new mini system is showing "Vulnerable - No microcode" for the "Special register buffer data sampling (CVE-2020-0543)" vulnerability.
However when I go and look at the Intel site for vulnerabilities versus CPU then for the Celeron J series and CVE-2020-0543 it shows Not Affected.
The vulnerability would need the attacker to have local access to the system and be authenticated, which would mean logged in as root so then you would have already lost big time as they could access anything but it just puzzled me why it is shown as Vulnerable. I presume that this comes from info from Intel that is in the kernel.
Regards,
Adolf.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2025-09-27 13:01 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-09-27 13:01 Special register buffer data sampling (CVE-2020-0543) on new mini system Adolf Belka
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox