lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 13 Dec 2019 20:15:51 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4565-2] intel-microcode security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4565-2                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 13, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : intel-microcode
CVE ID         : CVE-2019-11135 CVE-2019-11139
Debian Bug     : 946515

This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop)
models of Intel CPUs which were not yet included in the Intel microcode
update released as DSA 4565-1. For details please refer to
https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf

Additionally this update rolls back CPU microcode for HEDT and Xeon
processors with signature 0x50654 which were affected by a regression
causing hangs on warm reboots (Cf. #946515).

For the oldstable distribution (stretch), these problems have been fixed
in version 3.20191115.2~deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 3.20191115.2~deb10u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=jWMK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists