Intel Releases New CPU Microcode For Two New Security Advisories
([Intel] 5 Hours Ago
November 2024)
- Reference: 0001505408
- News link: https://www.phoronix.com/news/Intel-November-2024-CPU-Micro
- Source link:
It's the second Tuesday of the month and this Patch Tuesday brings new CPU microcode for mitigating the latest Intel processor security vulnerabilities and updates to some previously disclosed issues.
The new CPU microcode published today mitigates for [1]Intel SA-01101 as a medium severity denial of service vulnerability. Some 4th and 5th Gen Xeon Scalable processors may allow for denial of service conditions while the new firmware will address those issues around faulty finite state machines (FSMs) within the hardware logic.
The other new one is [2]Intel SA-01079 as a "high" severity privilege escalation vulnerability affecting Intel Xeon CPUs with Software Guard Extensions (SGX). Improper condition checks within Intel Xeon CPUs with SGX could allow privilege escalation via local access.
There are also updates for the previously disclosed Intel SA-01097 and SA-01103 advisories. Today's Intel CPU microcode drop also fixes a variety of functional issues for Intel Core Ultra CPUs, 12th / 13th / 14th Gen Core, and 3rd / 4th / 5th Gen Xeon Scalable processors plus Xeon D-1700 / D-1800 / D-2700 processors.
The new Intel CPU microcode binaries are out now on [3]GitHub .
[1] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
[2] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
[3] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
The new CPU microcode published today mitigates for [1]Intel SA-01101 as a medium severity denial of service vulnerability. Some 4th and 5th Gen Xeon Scalable processors may allow for denial of service conditions while the new firmware will address those issues around faulty finite state machines (FSMs) within the hardware logic.
The other new one is [2]Intel SA-01079 as a "high" severity privilege escalation vulnerability affecting Intel Xeon CPUs with Software Guard Extensions (SGX). Improper condition checks within Intel Xeon CPUs with SGX could allow privilege escalation via local access.
There are also updates for the previously disclosed Intel SA-01097 and SA-01103 advisories. Today's Intel CPU microcode drop also fixes a variety of functional issues for Intel Core Ultra CPUs, 12th / 13th / 14th Gen Core, and 3rd / 4th / 5th Gen Xeon Scalable processors plus Xeon D-1700 / D-1800 / D-2700 processors.
The new Intel CPU microcode binaries are out now on [3]GitHub .
[1] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
[2] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
[3] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112
JEBjames