CVE-2021-33117

NameCVE-2021-33117
DescriptionImproper access control for some 3rd Generation Intel(R) Xeon(R) Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
intel-microcode (PTS)buster/non-free3.20220510.1~deb10u1fixed
buster/non-free (security)3.20231114.1~deb10u1fixed
bullseye/non-free, bullseye/non-free (security)3.20231114.1~deb11u1fixed
bookworm/non-free-firmware (security), bookworm/non-free-firmware3.20231114.1~deb12u1fixed
trixie/non-free-firmware, sid/non-free-firmware3.20240312.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
intel-microcodesourcebuster3.20220207.1~deb10u1
intel-microcodesourcebullseye3.20220207.1~deb11u1
intel-microcodesource(unstable)3.20220207.1

Notes

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html
Fixed via m_87_606a6_0d000331.inc: sig 0x000606a6, pf_mask 0x87, 2021-12-03, rev 0xd000331, size 291840

Search for package or bug name: Reporting problems