DSA-5563-1 intel-microcode -- security update

Related Vulnerabilities: CVE-2023-23583  

Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa Milburn, Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi, Josh Eads, Salman Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela, Doug Kwan, and Kostik Shtoyk discovered that some Intel processors mishandle repeated sequences of instructions leading to unexpected behavior, which may result in privilege escalation, information disclosure or denial of service. For the oldstable distribution (bullseye), this problem has been fixed in version 3.20231114.1~deb11u1. For the stable distribution (bookworm), this problem has been fixed in version 3.20231114.1~deb12u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode

Debian Security Advisory

DSA-5563-1 intel-microcode -- security update

Date Reported:
23 Nov 2023
Affected Packages:
intel-microcode
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1055962.
In Mitre's CVE dictionary: CVE-2023-23583.
More information:

Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa Milburn, Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi, Josh Eads, Salman Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela, Doug Kwan, and Kostik Shtoyk discovered that some Intel processors mishandle repeated sequences of instructions leading to unexpected behavior, which may result in privilege escalation, information disclosure or denial of service.

For the oldstable distribution (bullseye), this problem has been fixed in version 3.20231114.1~deb11u1.

For the stable distribution (bookworm), this problem has been fixed in version 3.20231114.1~deb12u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode