Bug 57768 - intel-microcode: Multiple issues (5.0)
Summary: intel-microcode: Multiple issues (5.0)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.0
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.0-9-errata
Assignee: Quality Assurance
QA Contact: Felix Botner
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-11-25 13:55 CET by Quality Assurance
Modified: 2024-11-27 13:57 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H) NVD RedHat


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2024-11-25 13:55:10 CET
New Debian intel-microcode 3.20240910.1~deb10u1 fixes:
This update addresses the following issues:
3.20240910.1~deb10u1 (Sun, 24 Nov 2024 13:47:06 +0100)
* Non-maintainer upload by the ELTS Security Team.
* Rebuild for buster.
3.20240910.1~deb11u1 (Sun, 24 Nov 2024 13:11:47 +0100)
[ Tobias Frost ]
* Non-maintainer upload by the LTS security team. Thanks to Henrique for  preparing the package!
[ Henrique de Moraes Holschuh ]
* Build for bullseye
* All trixie-only changes (from 3.20240813.2) are reverted on this branch
3.20240910.1 (Sat, 21 Sep 2024 16:40:07 -0300)
* New upstream microcode datafile 20240910 - Mitigations for INTEL-SA-01103  (CVE-2024-23984) A potential security vulnerability in the Running Average  Power Limit (RAPL) interface for some Intel Processors may allow  information disclosure. - Mitigations for INTEL-SA-01097 (CVE-2024-24968) A  potential security vulnerability in some Intel Processors may allow denial  of service. - Fixes for unspecified functional issues on several processor  models - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A  FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but THE  VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED THROUGH  THE FIT TABLE IN FIRMWARE. Contact your system vendor for a firmware update  that includes the appropriate microcode update for your processor.
* Updated Microcodes: sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036,  size 224256 sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036 sig  0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036 sig 0x000b06f5, pf_mask  0x07, 2024-02-22, rev 0x0036 sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev  0x0434, size 222208 sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434  sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216 sig  0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040 sig  0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160 sig  0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122 sig 0x000b06a8, pf_mask  0xe0, 2024-02-22, rev 0x4122 sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev  0x001a, size 138240
* Update changelog for 3.20240813.1 with new information
* Update changelog for 3.20240514.1 with new information
* source: update symlinks to reflect id of the latest release, 20240910
Comment 1 Quality Assurance univentionstaff 2024-11-25 14:00:10 CET
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20240813.1~deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-9/source/intel-microcode_3.20240910.1~deb10u1.dsc
@@ -1,3 +1,52 @@
+3.20240910.1~deb10u1 [Sun, 24 Nov 2024 13:47:06 +0100] Tobias Frost <tobi@debian.org>:
+
+  * Non-maintainer upload by the ELTS Security Team.
+  * Rebuild for buster.
+
+3.20240910.1~deb11u1 [Sun, 24 Nov 2024 13:11:47 +0100] Tobias Frost <tobi@debian.org>:
+
+  [ Tobias Frost ]
+  * Non-maintainer upload by the LTS security team. Thanks to Henrique for
+    preparing the package!
+
+  [ Henrique de Moraes Holschuh ]
+  * Build for bullseye
+  * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+3.20240910.1 [Sat, 21 Sep 2024 16:40:07 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20240910 (closes: #1081363)
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure.
+    - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
+      A potential security vulnerability in some Intel Processors may allow
+      denial of service.
+    - Fixes for unspecified functional issues on several processor models
+    - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
+      FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
+      THE VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED
+      THROUGH THE FIT TABLE IN FIRMWARE.  Contact your system vendor for a
+      firmware update that includes the appropriate microcode update for
+      your processor.
+  * Updated Microcodes:
+    sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
+    sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036
+    sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036
+    sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036
+    sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
+    sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434
+    sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216
+    sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040
+    sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122
+    sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122
+    sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240
+  * Update changelog for 3.20240813.1 with new information
+  * Update changelog for 3.20240514.1 with new information
+  * source: update symlinks to reflect id of the latest release, 20240910
+
 3.20240813.1~deb10u1 [Thu, 22 Aug 2024 01:58:10 +0200] Daniel Leidert <dleidert@debian.org>:
 
   * Non-maintainer upload by the LTS Security Team.

<http://piuparts.knut.univention.de/5.0-9/#4929868293182490723>
Comment 2 Iván.Delgado univentionstaff 2024-11-26 11:55:51 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-9] 05fd5de1dc Bug #57768: intel-microcode 3.20240910.1~deb10u1
 doc/errata/staging/intel-microcode.yaml | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)