Bug 55933 - intel-microcode: Multiple issues (5.0)
intel-microcode: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-3-errata
Assigned To: Quality Assurance
Iván.Delgado
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2023-04-03 10:12 CEST by Quality Assurance
Modified: 2023-04-12 13:21 CEST (History)
2 users (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2023-04-03 10:12:34 CEST
New Debian intel-microcode 3.20230214.1~deb10u1 fixes:
This update addresses the following issues:
* Intel firmware update for insufficient granularity of access control in  out-of-band management in some Intel Atom and Intel Xeon Scalable  Processors (CVE-2022-21216)
* cpu: Intel: Stale Data Read from legacy xAPIC vulnerability  (CVE-2022-21233)
* Intel firmware update for Incorrect default permissions in some memory  controller configurations (CVE-2022-33196)
* Intel firmware update for incorrect calculation in microcode keying  mechanism (CVE-2022-33972)
* Intel firmware update for improper isolation of shared resources  (CVE-2022-38090)
Comment 1 Iván.Delgado univentionstaff 2023-04-04 16:04:40 CEST
E: advisory "/tmp/tmp.UoEVHvmHzX/intel-microcode.yaml" has issues:
[SKIP] bugzilla.valid: Disabled
[FAIL] changes.valid: Mismatching binary package version: 3.20230214.1~deb10u1 != intel-microcode 3.20220510.1~deb10u1 from intel-microcode 3.20220510.1~deb10u1
2023-04-04 16:02:57,624 Check patches Bug 55933 ...
2023-04-04 16:02:58,311 Check Piuparts None ...
FAIL: bug
OK: yaml
FAIL: announce_errata
FAIL: patch
FAIL: piuparts
Comment 2 Philipp Hahn univentionstaff 2023-04-05 14:38:24 CEST
Debian is incomplete:
http://ftp.de.debian.org/debian-security/pool/updates/non-free/i/intel-microcode/

https://tracker.debian.org/pkg/intel-microcode

I mailed Debian and asked them to have a look.
Comment 3 Quality Assurance univentionstaff 2023-04-06 09:42:21 CEST
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20220510.1~deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-3/source/intel-microcode_3.20230214.1~deb10u1.dsc
@@ -1,3 +1,112 @@
+3.20230214.1~deb10u1 [Sat, 01 Apr 2023 10:37:09 +0200] Tobias Frost <tobi@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * Backport package 3.20230214.1 for buster-security.
+  * New upstream microcode datafile 20230214
+    - Includes Fixes for: (Closes: #1031334)
+       - INTEL-SA-00700 (CVE-2022-21216):
+         Insufficient granularity of access control in out-of-band management
+         in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a
+         privileged user to potentially enable escalation of privilege via
+         adjacent network access.
+       - INTEL-SA-00730 (CVE-2022-33972):
+         Incorrect calculation in microcode keying mechanism for some 3rd
+         Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged
+         user to potentially enable information disclosure via local acces
+       - INTEL-SA-00738 (CVE-2022-33196):
+         Incorrect default permissions in some memory controller configurations
+         for some Intel(R) Xeon(R) Processors when using Intel(R) Software
+         Guard Extensions which may allow a privileged user to potentially
+         enable escalation of privilege via local access.
+         The fix for Intel-SA 0000738 may require a firmware update to be
+         effective on some processors.
+       - INTEL-SA-00767 (CVE-2022-38090):
+         Improper isolation of shared resources in some Intel(R) Processors
+         when using Intel(R) Software Guard Extensions may allow a privileged
+         user to potentially enable information disclosure via local access.
+  * New Microcodes:
+    sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
+    sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
+  * Updated Microcodes:
+    sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864
+    sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888
+    sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888
+    sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696
+    sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960
+    sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792
+    sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776
+    sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800
+    sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664
+    sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816
+    sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
+    sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
+    sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480
+    sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424
+    sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872
+    sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+
+3.20221108.1 [Sat, 03 Dec 2022 17:21:08 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20221108
+    * New Microcodes:
+      sig 0x000606c1, pf_mask 0x10, 2022-08-07, rev 0x1000201, size 286720
+      sig 0x000b0671, pf_mask 0x32, 2022-09-07, rev 0x010e, size 204800
+    * Updated Microcodes:
+      sig 0x000706e5, pf_mask 0x80, 2022-08-02, rev 0x00b6, size 113664
+      sig 0x000806c1, pf_mask 0x80, 2022-06-28, rev 0x00a6, size 110592
+      sig 0x000806d1, pf_mask 0xc2, 2022-06-28, rev 0x0042, size 102400
+      sig 0x000806ec, pf_mask 0x94, 2022-07-31, rev 0x00f4, size 105472
+      sig 0x00090661, pf_mask 0x01, 2022-07-15, rev 0x0017, size 20480
+      sig 0x00090672, pf_mask 0x07, 2022-09-19, rev 0x0026, size 218112
+      sig 0x00090675, pf_mask 0x07, 2022-09-19, rev 0x0026
+      sig 0x000b06f2, pf_mask 0x07, 2022-09-19, rev 0x0026
+      sig 0x000b06f5, pf_mask 0x07, 2022-09-19, rev 0x0026
+      sig 0x000906a3, pf_mask 0x80, 2022-09-19, rev 0x0424, size 217088
+      sig 0x000906a4, pf_mask 0x80, 2022-09-19, rev 0x0424
+      sig 0x000906ed, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 104448
+      sig 0x000a0652, pf_mask 0x20, 2022-07-31, rev 0x00f4, size 96256
+      sig 0x000a0653, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 97280
+      sig 0x000a0655, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 96256
+      sig 0x000a0660, pf_mask 0x80, 2022-07-31, rev 0x00f4, size 97280
+      sig 0x000a0661, pf_mask 0x80, 2022-07-31, rev 0x00f4, size 96256
+      sig 0x000a0671, pf_mask 0x02, 2022-08-02, rev 0x0056, size 103424
+
+3.20220809.1 [Fri, 19 Aug 2022 14:21:20 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20220809
+    * Fixes INTEL-SA-00657, CVE-2022-21233
+      Stale data from APIC leaks SGX memory (AEPIC leak)
+    * Fixes unspecified errata (functional issues) on Xeon Scalable
+    * Updated Microcodes:
+      sig 0x00050653, pf_mask 0x97, 2022-03-14, rev 0x100015e, size 34816
+      sig 0x00050654, pf_mask 0xb7, 2022-03-08, rev 0x2006e05, size 44032
+      sig 0x000606a6, pf_mask 0x87, 2022-04-07, rev 0xd000375, size 293888
+      sig 0x000706a1, pf_mask 0x01, 2022-03-23, rev 0x003c, size 75776
+      sig 0x000706a8, pf_mask 0x01, 2022-03-23, rev 0x0020, size 75776
+      sig 0x000706e5, pf_mask 0x80, 2022-03-17, rev 0x00b2, size 112640
+      sig 0x000806c2, pf_mask 0xc2, 2022-03-19, rev 0x0028, size 97280
+      sig 0x000806d1, pf_mask 0xc2, 2022-03-28, rev 0x0040, size 102400
+      sig 0x00090672, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
+      sig 0x00090675, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
+      sig 0x000906a3, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064
+      sig 0x000906a4, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064
+      sig 0x000a0671, pf_mask 0x02, 2022-03-17, rev 0x0054, size 103424
+      sig 0x000b06f2, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
+      sig 0x000b06f5, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
+  * source: update symlinks to reflect id of the latest release, 20220809
+
 3.20220510.1~deb10u1 [Mon, 04 Jul 2022 16:42:50 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
 
   * Backport to Debian buster (no relevant changes)

<http://piuparts.knut.univention.de/5.0-3/#2651352266757047496>
Comment 4 Philipp Hahn univentionstaff 2023-04-06 09:45:14 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-3] 4eca8ac35e Bug #55933: intel-microcode 3.20230214.1~deb10u1
 doc/errata/staging/intel-microcode.yaml | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

[5.0-3] 6b597c1d20 Bug #55933: intel-microcode 3.20230214.1~deb10u1
 doc/errata/staging/intel-microcode.yaml | 26 ++++++++++++++++++++++++++
 1 file changed, 26 insertions(+)