DSA-5474-1 intel-microcode -- security update

Related Vulnerabilities: CVE-2022-40982   CVE-2022-41804   CVE-2023-23908  

This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for security vulnerabilities. CVE-2022-40982 Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware vulnerability which allows unprivileged speculative access to data which was previously stored in vector registers. For details please refer to /https://downfall.page> and https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html>. CVE-2022-41804 Unauthorized error injection in Intel SGX or Intel TDX for some Intel Xeon Processors which may allow a local user to potentially escalate privileges. CVE-2023-23908 Improper access control in some 3rd Generation Intel Xeon Scalable processors may result in an information leak. For the oldstable distribution (bullseye), these problems have been fixed in version 3.20230808.1~deb11u1. For the stable distribution (bookworm), these problems have been fixed in version 3.20230808.1~deb12u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode

Debian Security Advisory

DSA-5474-1 intel-microcode -- security update

Date Reported:
11 Aug 2023
Affected Packages:
intel-microcode
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1043305.
In Mitre's CVE dictionary: CVE-2022-40982, CVE-2022-41804, CVE-2023-23908.
More information:

This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for security vulnerabilities.

For the oldstable distribution (bullseye), these problems have been fixed in version 3.20230808.1~deb11u1.

For the stable distribution (bookworm), these problems have been fixed in version 3.20230808.1~deb12u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode