Opened 7 months ago

Closed 6 months ago

#20353 closed enhancement (fixed)

intel-microcode-20240910

Reported by: Xi Ruoyao Owned by: blfs-book
Priority: elevated Milestone: 12.3
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New microcode release with 2 upstream security advisories.

Change History (4)

comment:1 by Xi Ruoyao, 7 months ago

Note that the release contains the 0x129 revision for 13 and 14 generations, but loading it from an initramfs will NOT resolve the voltage issue which may lead to a permanent damage. To resolve the voltage issue it has to be loaded by the BIOS. A standalone copy of the microcode is only distributed for open-source BIOS implementations like Coreboot.

comment:2 by Xi Ruoyao, 7 months ago

The book in updated at r12.2-115-g6a92f62e7e. I just bumped the revision number (I don't have a system affected by the update) and added a note explaining some rare cases like Raptor Lake 0x129 are ineffective loading from the kernel.

I'll write up a SA later.

comment:3 by Douglas R. Reno, 7 months ago

The security vulnerabilities are:

CVE-2024-23984 (Medium): A potential security vulnerability in the Running Average Power Limit (RAPL) interface for some Intel® Processors may allow information disclosure. - Also known as https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html

CVE-2024-24968 (Medium): A potential security vulnerability in some Intel® Processors may allow denial of service. - Also known as https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html

CVE-2024-23984 only affects 3rd Generation Intel Xeon Scalable CPUs, while CVE-2024-24968 affects every CPU 10th Generation or Higher (as well as 3rd Generation Xeon Scalable CPUs and Xeon D series CPUs)

comment:4 by Douglas R. Reno, 6 months ago

Resolution: fixed
Status: newclosed

SA-12.2-015 issued

Note: See TracTickets for help on using tickets.