CVE-2021-33117

NameCVE-2021-33117
DescriptionImproper access control for some 3rd Generation Intel(R) Xeon(R) Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
intel-microcode (PTS)stretch/non-free3.20200616.1~deb9u1vulnerable
stretch/non-free (security)3.20210608.2~deb9u2vulnerable
buster/non-free3.20220207.1~deb10u1fixed
buster/non-free (security)3.20210608.2~deb10u1vulnerable
bullseye/non-free3.20220207.1~deb11u1fixed
bookworm/non-free3.20220207.1fixed
sid/non-free3.20220510.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
intel-microcodesourcebuster3.20220207.1~deb10u1
intel-microcodesourcebullseye3.20220207.1~deb11u1
intel-microcodesource(unstable)3.20220207.1

Notes

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html
Fixed via m_87_606a6_0d000331.inc: sig 0x000606a6, pf_mask 0x87, 2021-12-03, rev 0xd000331, size 291840

Search for package or bug name: Reporting problems