Bug 54960 - intel-microcode: Multiple issues (5.0)
intel-microcode: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-2-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-07-07 13:22 CEST by Quality Assurance
Modified: 2022-07-13 17:00 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2022-07-07 13:22:23 CEST
New Debian intel-microcode 3.20220510.1~deb10u1 fixes:
This update addresses the following issues:
* cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR)  (CVE-2022-21123)
* cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS)  (CVE-2022-21125)
* cpu: Incomplete cleanup in specific special register read operations (aka  SRBDS update) (CVE-2022-21127)
* cpu: information disclosure in certain Intel processors (CVE-2022-21151)
* cpu: Incomplete cleanup in specific special register write operations (aka  DRPW) (CVE-2022-21166)
Comment 1 Quality Assurance univentionstaff 2022-07-07 14:00:15 CEST
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20220207.1~deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-2/source/intel-microcode_3.20220510.1~deb10u1.dsc
@@ -1,3 +1,73 @@
+3.20220510.1~deb10u1 [Mon, 04 Jul 2022 16:42:50 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * Backport to Debian buster (no relevant changes)
+  * Update upstream changelog with INTEL-00615 information
+  * Mitigates INTEL-00615: CVE-2022-21151, CVE-2022-21166, CVE-2022-21127,
+    CVE-2022-21125, CVE-2022-21123
+
+3.20220510.1 [Sun, 15 May 2022 20:09:05 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20220510
+    * Fixes INTEL-SA-000617, CVE-2022-21151:
+      Processor optimization removal or modification of security-critical
+      code may allow an authenticated user to potentially enable information
+      disclosure via local access (closes: #1010947)
+    * Fixes several errata (functional issues) on Xeon Scalable, Atom C3000,
+      Atom E3900
+    * New Microcodes:
+      sig 0x00090672, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
+      sig 0x00090675, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
+      sig 0x000906a3, pf_mask 0x80, 2022-03-24, rev 0x041c, size 212992
+      sig 0x000906a4, pf_mask 0x80, 2022-03-24, rev 0x041c, size 212992
+      sig 0x000b06f2, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
+      sig 0x000b06f5, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
+    * Updated Microcodes:
+      sig 0x00030679, pf_mask 0x0f, 2019-07-10, rev 0x090d, size 52224
+      sig 0x000406e3, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 106496
+      sig 0x00050653, pf_mask 0x97, 2021-11-13, rev 0x100015d, size 34816
+      sig 0x00050654, pf_mask 0xb7, 2021-11-13, rev 0x2006d05, size 43008
+      sig 0x00050656, pf_mask 0xbf, 2021-12-10, rev 0x4003302, size 37888
+      sig 0x00050657, pf_mask 0xbf, 2021-12-10, rev 0x5003302, size 37888
+      sig 0x0005065b, pf_mask 0xbf, 2021-11-19, rev 0x7002501, size 29696
+      sig 0x000506c9, pf_mask 0x03, 2021-11-16, rev 0x0048, size 17408
+      sig 0x000506e3, pf_mask 0x36, 2021-11-12, rev 0x00f0, size 109568
+      sig 0x000506f1, pf_mask 0x01, 2021-12-02, rev 0x0038, size 11264
+      sig 0x000606a6, pf_mask 0x87, 2022-03-30, rev 0xd000363, size 294912
+      sig 0x000706a1, pf_mask 0x01, 2021-11-22, rev 0x003a, size 75776
+      sig 0x000706a8, pf_mask 0x01, 2021-11-22, rev 0x001e, size 75776
+      sig 0x000706e5, pf_mask 0x80, 2022-03-09, rev 0x00b0, size 112640
+      sig 0x000806a1, pf_mask 0x10, 2022-03-26, rev 0x0031, size 34816
+      sig 0x000806c1, pf_mask 0x80, 2022-02-01, rev 0x00a4, size 109568
+      sig 0x000806c2, pf_mask 0xc2, 2021-12-07, rev 0x0026, size 97280
+      sig 0x000806d1, pf_mask 0xc2, 2021-12-07, rev 0x003e, size 102400
+      sig 0x000806e9, pf_mask 0x10, 2021-11-12, rev 0x00f0, size 105472
+      sig 0x000806e9, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 105472
+      sig 0x000806ea, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 105472
+      sig 0x000806eb, pf_mask 0xd0, 2021-11-15, rev 0x00f0, size 105472
+      sig 0x000806ec, pf_mask 0x94, 2021-11-17, rev 0x00f0, size 105472
+      sig 0x00090661, pf_mask 0x01, 2022-02-03, rev 0x0016, size 20480
+      sig 0x000906c0, pf_mask 0x01, 2022-02-19, rev 0x24000023, size 20480
+      sig 0x000906e9, pf_mask 0x2a, 2021-11-12, rev 0x00f0, size 108544
+      sig 0x000906ea, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 104448
+      sig 0x000906eb, pf_mask 0x02, 2021-11-12, rev 0x00f0, size 105472
+      sig 0x000906ec, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 104448
+      sig 0x000906ed, pf_mask 0x22, 2021-11-16, rev 0x00f0, size 104448
+      sig 0x000a0652, pf_mask 0x20, 2021-11-16, rev 0x00f0, size 96256
+      sig 0x000a0653, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 97280
+      sig 0x000a0655, pf_mask 0x22, 2021-11-16, rev 0x00f0, size 96256
+      sig 0x000a0660, pf_mask 0x80, 2021-11-15, rev 0x00f0, size 96256
+      sig 0x000a0661, pf_mask 0x80, 2021-11-16, rev 0x00f0, size 96256
+      sig 0x000a0671, pf_mask 0x02, 2022-03-09, rev 0x0053, size 103424
+  * source: update symlinks to reflect id of the latest release, 20220510
+
+3.20220419.1 [Thu, 21 Apr 2022 17:25:05 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20220419
+    * Fixes errata APLI-11 in Atom E3900 series processors
+    * Updated Microcodes:
+      sig 0x000506ca, pf_mask 0x03, 2021-11-16, rev 0x0028, size 16384
+  * source: update symlinks to reflect id of the latest release, 20220419
+
 3.20220207.1~deb10u1 [Sun, 20 Mar 2022 18:19:10 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
 
   * Backport for Debian oldstable (no changes)

<http://piuparts.knut.univention.de/5.0-2/#5868506242720605162>
Comment 2 Philipp Hahn univentionstaff 2022-07-07 14:34:00 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-2] 05c74b4424 Bug #54960: intel-microcode 3.20220510.1~deb10u1
 doc/errata/staging/intel-microcode.yaml | 24 ++++++++++++++++++++++++
 1 file changed, 24 insertions(+)