Improper Check for Unusual or Exceptional Conditions Affecting intel-microcode package, versions <3.20191112.1
Threat Intelligence
EPSS
0.05% (22nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN13-INTELMICROCODE-5682766
- published 13 Nov 2019
- disclosed 14 Nov 2019
Introduced: 13 Nov 2019
CVE-2019-11139 Open this link in a new tabHow to fix?
Upgrade Debian:13
intel-microcode
to version 3.20191112.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream intel-microcode
package and not the intel-microcode
package as distributed by Debian
.
See How to fix?
for Debian:13
relevant fixed versions and status.
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
References
- https://security-tracker.debian.org/tracker/CVE-2019-11139
- https://seclists.org/bugtraq/2019/Dec/28
- https://support.f5.com/csp/article/K42433061?utm_source=f5support&utm_medium=RSS
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-11139
- https://support.f5.com/csp/article/K42433061?utm_source=f5support&%3Butm_medium=RSS
CVSS Scores
version 3.1