[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4095-1] intel-microcode security update



-------------------------------------------------------------------------
Debian LTS Advisory DLA-4095-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Tobias Frost
March 29, 2025                                https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : intel-microcode
Version        : 3.20250211.1~deb11u1
CVE ID         : CVE-2023-34440 CVE-2023-43758 CVE-2024-24582 CVE-2024-28047 
                 CVE-2024-28127 CVE-2024-29214 CVE-2024-31068 CVE-2024-31157 
                 CVE-2024-36293 CVE-2024-37020 CVE-2024-39279 CVE-2024-39355
Debian Bug     : 1095805

Microcode updates has been released for Intel(R) processors, addressing 
multiple potential vulnerabilties that may allow local privilege escalation,
denial of service or information disclosure.

CVE-2023-34440 (INTEL-SA-01139)

    Improper input validation in UEFI firmware for some Intel(R) Processors
    may allow a privileged user to potentially enable escalation of
    privilege via local access.

CVE-2023-43758 (INTEL-SA-01139)

    Improper input validation in UEFI firmware for some Intel(R) processors
    may allow a privileged user to potentially enable escalation of
    privilege via local access.

CVE-2024-24582 (INTEL-SA-01139)

    Improper input validation in XmlCli feature for UEFI firmware for some
    Intel(R) processors may allow privileged user to potentially enable
    escalation of privilege via local access.

CVE-2024-28047 (INTEL-SA-01139)

    Improper input validation in UEFI firmware for some Intel(R) Processors
    may allow a privileged user to potentially enable information disclosure
    via local access.

CVE-2024-28127 (INTEL-SA-01139)

    Improper input validation in UEFI firmware for some Intel(R) Processors
    may allow a privileged user to potentially enable escalation of
    privilege via local access.

CVE-2024-29214 (INTEL-SA-01139)

    Improper input validation in UEFI firmware CseVariableStorageSmm for
    some Intel(R) Processors may allow a privileged user to potentially
    enable escalation of privilege via local access.

CVE-2024-31068 (INTEL-SA-01166)

    Improper Finite State Machines (FSMs) in Hardware Logic for some
    Intel(R) Processors may allow privileged user to potentially enable
    denial of service via local access.

CVE-2024-31157 (INTEL-SA-01139)

    Improper initialization in UEFI firmware OutOfBandXML module in some
    Intel(R) Processors may allow a privileged user to potentially enable
    information disclosure via local access.

CVE-2024-36293 (INTEL-SA-01213)

    Improper access control in the EDECCSSA user leaf function for some
    Intel(R) Processors with Intel(R) SGX may allow an authenticated user to
    potentially enable denial of service via local access.

CVE-2024-37020 (INTEL-SA-01194)

    Sequence of processor instructions leads to unexpected behavior in the
    Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an
    authenticated user to potentially enable denial of service via local
    access.

CVE-2024-39279 (INTEL-SA-01139)

    Insufficient granularity of access control in UEFI firmware in some
    Intel(R) processors may allow a authenticated user to potentially enable
    denial of service via local access.

CVE-2024-39355 (INTEL-SA-01228)

    Improper handling of physical or environmental conditions in some
    Intel(R) Processors may allow an authenticated user to enable denial of
    service via local access.

For Debian 11 bullseye, these problems have been fixed in version
3.20250211.1~deb11u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature


Reply to: