CVE-2021-33120

NameCVE-2021-33120
DescriptionOut of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
intel-microcode (PTS)buster/non-free3.20220510.1~deb10u1fixed
buster/non-free (security)3.20231114.1~deb10u1fixed
bullseye/non-free, bullseye/non-free (security)3.20231114.1~deb11u1fixed
bookworm/non-free-firmware (security), bookworm/non-free-firmware3.20231114.1~deb12u1fixed
trixie/non-free-firmware, sid/non-free-firmware3.20240312.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
intel-microcodesourcebuster3.20220207.1~deb10u1
intel-microcodesourcebullseye3.20220207.1~deb11u1
intel-microcodesource(unstable)3.20220207.1

Notes

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html

Search for package or bug name: Reporting problems