This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for security vulnerabilities. CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166 Various researchers discovered flaws in Intel processors, collectively referred to as MMIO Stale Data vulnerabilities, which may result in information leak to local users. For details please refer to https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html CVE-2022-21151 Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that for some Intel processors optimization removal or modification of security-critical code may result in information disclosure to local users. For the oldstable distribution (buster), these problems have been fixed in version 3.20220510.1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 3.20220510.1~deb11u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode
This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for security vulnerabilities.
Various researchers discovered flaws in Intel processors, collectively referred to as MMIO Stale Data vulnerabilities, which may result in information leak to local users.
For details please refer to https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html
Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that for some Intel processors optimization removal or modification of security-critical code may result in information disclosure to local users.
For the oldstable distribution (buster), these problems have been fixed in version 3.20220510.1~deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 3.20220510.1~deb11u1.
We recommend that you upgrade your intel-microcode packages.
For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode