ELA-1088-1 intel-microcode security update

microcode update

2024-05-05
Packageintel-microcode
Version3.20240312.1~deb8u1 (jessie), 3.20240312.1~deb9u1 (stretch)
Related CVEs CVE-2023-22655 CVE-2023-28746 CVE-2023-38575 CVE-2023-39368 CVE-2023-43490


Intel has released microcode updates, addressing serveral vulnerabilties:

CVE-2023-22655

Protection mechanism failure in some 3rd and 4th Generation Intel(R)
Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow
a privileged user to potentially enable escalation of privilege via
local access.

CVE-2023-28746

Information exposure through microarchitectural state after
transient execution from some register files for some Intel(R)
Atom(R) Processors may allow an authenticated user to potentially
enable information disclosure via local access.

CVE-2023-38575

Non-transparent sharing of return predictor targets between contexts
in some Intel(R) Processors may allow an authorized user to
potentially enable information disclosure via local access.

CVE-2023-39368

Protection mechanism failure of bus lock regulator for some Intel(R)
Processors may allow an unauthenticated user to potentially enable
denial of service via network access.

CVE-2023-43490

Incorrect calculation in microcode keying mechanism for some
Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a
privileged user to potentially enable information disclosure via
local access.


For Debian 8 jessie, these problems have been fixed in version 3.20240312.1~deb8u1.

For Debian 9 stretch, these problems have been fixed in version 3.20240312.1~deb9u1.

We recommend that you upgrade your intel-microcode packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.