Debian LTS: DLA-3379-1: intel-microcode security update
Summary
CVE-2022-21216 (INTEL-SA-00700)
Insufficient granularity of access control in out-of-band
management in some Intel(R) Atom and Intel Xeon Scalable Processors
may allow a privileged user to potentially enable escalation of
privilege via adjacent network access.
CVE-2022-33196 (INTEL-SA-00738)
Incorrect default permissions in some memory controller
configurations for some Intel(R) Xeon(R) Processors when using
Intel(R) Software Guard Extensions which may allow a privileged user
to potentially enable escalation of privilege via local access.
This fix may require a firmware update to be effective on some
processors.
CVE-2022-33972 (INTEL-SA-00730)
Incorrect calculation in microcode keying mechanism for some 3rd
Generation Intel(R) Xeon(R) Scalable Processors may allow a
privileged user to potentially enable information disclosure via
local acces
CVE-2022-38090 (INTEL-SA-00767)
Improper isolation of shared resources in some Intel(R) Processors
when using Intel(R) Software Guard Extensions may allow a privileged
user to potentially enable information disclosure via local access.
CVE-2022-21233 (INTEL-SA-00657)
Improper isolation of shared resources in some Intel(R) Processors
may allow a privileged user to potentially enable information
disclosure via local access.
For Debian 10 buster, these problems have been fixed in version
3.20230214.1~deb10u1.
We recommend that you upgrade your intel-microcode packages.
For the detailed security status of intel-microcode please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/intel-microcode
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS