Univention Bugzilla – Bug 55933
intel-microcode: Multiple issues (5.0)
Last modified: 2023-04-12 13:21:51 CEST
New Debian intel-microcode 3.20230214.1~deb10u1 fixes: This update addresses the following issues: * Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors (CVE-2022-21216) * cpu: Intel: Stale Data Read from legacy xAPIC vulnerability (CVE-2022-21233) * Intel firmware update for Incorrect default permissions in some memory controller configurations (CVE-2022-33196) * Intel firmware update for incorrect calculation in microcode keying mechanism (CVE-2022-33972) * Intel firmware update for improper isolation of shared resources (CVE-2022-38090)
E: advisory "/tmp/tmp.UoEVHvmHzX/intel-microcode.yaml" has issues: [SKIP] bugzilla.valid: Disabled [FAIL] changes.valid: Mismatching binary package version: 3.20230214.1~deb10u1 != intel-microcode 3.20220510.1~deb10u1 from intel-microcode 3.20220510.1~deb10u1 2023-04-04 16:02:57,624 Check patches Bug 55933 ... 2023-04-04 16:02:58,311 Check Piuparts None ... FAIL: bug OK: yaml FAIL: announce_errata FAIL: patch FAIL: piuparts
Debian is incomplete: http://ftp.de.debian.org/debian-security/pool/updates/non-free/i/intel-microcode/ https://tracker.debian.org/pkg/intel-microcode I mailed Debian and asked them to have a look.
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20220510.1~deb10u1.dsc +++ apt/ucs_5.0-0-errata5.0-3/source/intel-microcode_3.20230214.1~deb10u1.dsc @@ -1,3 +1,112 @@ +3.20230214.1~deb10u1 [Sat, 01 Apr 2023 10:37:09 +0200] Tobias Frost <tobi@debian.org>: + + * Non-maintainer upload by the LTS Security Team. + * Backport package 3.20230214.1 for buster-security. + * New upstream microcode datafile 20230214 + - Includes Fixes for: (Closes: #1031334) + - INTEL-SA-00700 (CVE-2022-21216): + Insufficient granularity of access control in out-of-band management + in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a + privileged user to potentially enable escalation of privilege via + adjacent network access. + - INTEL-SA-00730 (CVE-2022-33972): + Incorrect calculation in microcode keying mechanism for some 3rd + Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged + user to potentially enable information disclosure via local acces + - INTEL-SA-00738 (CVE-2022-33196): + Incorrect default permissions in some memory controller configurations + for some Intel(R) Xeon(R) Processors when using Intel(R) Software + Guard Extensions which may allow a privileged user to potentially + enable escalation of privilege via local access. + The fix for Intel-SA 0000738 may require a firmware update to be + effective on some processors. + - INTEL-SA-00767 (CVE-2022-38090): + Improper isolation of shared resources in some Intel(R) Processors + when using Intel(R) Software Guard Extensions may allow a privileged + user to potentially enable information disclosure via local access. + * New Microcodes: + sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 + sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 + * Updated Microcodes: + sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864 + sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888 + sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888 + sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696 + sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960 + sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792 + sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776 + sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800 + sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664 + sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 + sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 + sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 + sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480 + sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424 + sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872 + sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + +3.20221108.1 [Sat, 03 Dec 2022 17:21:08 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: + + * New upstream microcode datafile 20221108 + * New Microcodes: + sig 0x000606c1, pf_mask 0x10, 2022-08-07, rev 0x1000201, size 286720 + sig 0x000b0671, pf_mask 0x32, 2022-09-07, rev 0x010e, size 204800 + * Updated Microcodes: + sig 0x000706e5, pf_mask 0x80, 2022-08-02, rev 0x00b6, size 113664 + sig 0x000806c1, pf_mask 0x80, 2022-06-28, rev 0x00a6, size 110592 + sig 0x000806d1, pf_mask 0xc2, 2022-06-28, rev 0x0042, size 102400 + sig 0x000806ec, pf_mask 0x94, 2022-07-31, rev 0x00f4, size 105472 + sig 0x00090661, pf_mask 0x01, 2022-07-15, rev 0x0017, size 20480 + sig 0x00090672, pf_mask 0x07, 2022-09-19, rev 0x0026, size 218112 + sig 0x00090675, pf_mask 0x07, 2022-09-19, rev 0x0026 + sig 0x000b06f2, pf_mask 0x07, 2022-09-19, rev 0x0026 + sig 0x000b06f5, pf_mask 0x07, 2022-09-19, rev 0x0026 + sig 0x000906a3, pf_mask 0x80, 2022-09-19, rev 0x0424, size 217088 + sig 0x000906a4, pf_mask 0x80, 2022-09-19, rev 0x0424 + sig 0x000906ed, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 104448 + sig 0x000a0652, pf_mask 0x20, 2022-07-31, rev 0x00f4, size 96256 + sig 0x000a0653, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 97280 + sig 0x000a0655, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 96256 + sig 0x000a0660, pf_mask 0x80, 2022-07-31, rev 0x00f4, size 97280 + sig 0x000a0661, pf_mask 0x80, 2022-07-31, rev 0x00f4, size 96256 + sig 0x000a0671, pf_mask 0x02, 2022-08-02, rev 0x0056, size 103424 + +3.20220809.1 [Fri, 19 Aug 2022 14:21:20 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: + + * New upstream microcode datafile 20220809 + * Fixes INTEL-SA-00657, CVE-2022-21233 + Stale data from APIC leaks SGX memory (AEPIC leak) + * Fixes unspecified errata (functional issues) on Xeon Scalable + * Updated Microcodes: + sig 0x00050653, pf_mask 0x97, 2022-03-14, rev 0x100015e, size 34816 + sig 0x00050654, pf_mask 0xb7, 2022-03-08, rev 0x2006e05, size 44032 + sig 0x000606a6, pf_mask 0x87, 2022-04-07, rev 0xd000375, size 293888 + sig 0x000706a1, pf_mask 0x01, 2022-03-23, rev 0x003c, size 75776 + sig 0x000706a8, pf_mask 0x01, 2022-03-23, rev 0x0020, size 75776 + sig 0x000706e5, pf_mask 0x80, 2022-03-17, rev 0x00b2, size 112640 + sig 0x000806c2, pf_mask 0xc2, 2022-03-19, rev 0x0028, size 97280 + sig 0x000806d1, pf_mask 0xc2, 2022-03-28, rev 0x0040, size 102400 + sig 0x00090672, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064 + sig 0x00090675, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064 + sig 0x000906a3, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064 + sig 0x000906a4, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064 + sig 0x000a0671, pf_mask 0x02, 2022-03-17, rev 0x0054, size 103424 + sig 0x000b06f2, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064 + sig 0x000b06f5, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064 + * source: update symlinks to reflect id of the latest release, 20220809 + 3.20220510.1~deb10u1 [Mon, 04 Jul 2022 16:42:50 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: * Backport to Debian buster (no relevant changes) <http://piuparts.knut.univention.de/5.0-3/#2651352266757047496>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.0-3] 4eca8ac35e Bug #55933: intel-microcode 3.20230214.1~deb10u1 doc/errata/staging/intel-microcode.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) [5.0-3] 6b597c1d20 Bug #55933: intel-microcode 3.20230214.1~deb10u1 doc/errata/staging/intel-microcode.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.0x641>