-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4565-2 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso December 13, 2019 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : intel-microcode CVE ID : CVE-2019-11135 CVE-2019-11139 Debian Bug : 946515 This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop) models of Intel CPUs which were not yet included in the Intel microcode update released as DSA 4565-1. For details please refer to https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf Additionally this update rolls back CPU microcode for HEDT and Xeon processors with signature 0x50654 which were affected by a regression causing hangs on warm reboots (Cf. #946515). For the oldstable distribution (stretch), these problems have been fixed in version 3.20191115.2~deb9u1. For the stable distribution (buster), these problems have been fixed in version 3.20191115.2~deb10u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl3z8HFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Q6Mg/+OxHO9X+gNqI4c+KhBOFT6xsurXPVOHK+GlMWk7G8bQ7JIXTkP57lwTZq DKvgZAYn8oLLeDiAe9VfdYMKG6dmmGVqDFuSyI+0hJ61EnxnmfHr0v142g3lpHqn kWZDaJ9Isd/zYTtmTOLiieM2ln5ryqIA5zt5DGjTKorRsXooBDXN0kw8FiLbCIJV NRcsHtpZOh8W7t7DEXKjY1ReSXiZSUxDcYwD8Dzh7gEuF4rwwLOPMHzU/SREIIF3 6ioR2TJ95uEYfqFpUIuk2KrSnT9s+sXPFppOGSfRNDzQXeYgShtOsChWYYDcur4G Qe6ppnhMxOBB7Byi8oSBFSFr6YGQORAKweywiYIxXtQMWC4iYqL+1rA0HxjxjweT 1nqSLlEgAsSGlJBfLRd+MY6q7N8DQvJm1tLuUnonvbbKORy0umJIpw214i96Mlxm 6KTW1tq83eeg2iiqRjuP6BnraucYZhBOEVfnb+1qTes/QRe+nfDihbyLEHtoGebA E1pPSa7jrW3cdvlaj2ZyM87VzS2mxlgZRbjr7pnKdzZLcnfxmVpnVdbDQEwiVspL 6tUzzkCyUxgCMAjh73f1orr6Voq83j1Fg1KXhI2OCYRCFJASop+MGWbb3sYZG6Ek dxxqzl917/V0gw5qan+TzbqXjRGhNkqiYE8EDSlIa398RR95B6k=jWMK -----END PGP SIGNATURE-----