You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa intel-microcode

Sigurnosni nedostaci programskog paketa intel-microcode

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-4565-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 13, 2019 https://www.debian.org/security/faq
– ————————————————————————-

Package : intel-microcode
CVE ID : CVE-2019-11135 CVE-2019-11139
Debian Bug : 946515

This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop)
models of Intel CPUs which were not yet included in the Intel microcode
update released as DSA 4565-1. For details please refer to
https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf

Additionally this update rolls back CPU microcode for HEDT and Xeon
processors with signature 0x50654 which were affected by a regression
causing hangs on warm reboots (Cf. #946515).

For the oldstable distribution (stretch), these problems have been fixed
in version 3.20191115.2~deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 3.20191115.2~deb10u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=jWMK
—–END PGP SIGNATURE—–

AutorToni Vugdelija
Cert idNCERT-REF-2019-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-1_8_0-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-1_8_0-openjdk za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS...

Close