Bug 1221323 (CVE-2023-22655, CVE-2023-38575, CVE-2023-39368, CVE-2023-43490) - VUL-0: CVE-2023-28746: ucode-intel: 20240312 release
Summary: VUL-0: CVE-2023-28746: ucode-intel: 20240312 release
Status: RESOLVED FIXED
Alias: CVE-2023-22655, CVE-2023-38575, CVE-2023-39368, CVE-2023-43490
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Marcus Meissner
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv3.1:SUSE:CVE-2023-22655:6.1:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-13 07:42 UTC by Marcus Meissner
Modified: 2024-07-20 19:10 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2024-03-13 07:42:28 UTC
## [microcode-20240312](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312)

### Purpose

- Security updates for [INTEL-SA-INTEL-SA-00972](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html)
- Security updates for [INTEL-SA-INTEL-SA-00982](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html)
- Security updates for [INTEL-SA-INTEL-SA-00898](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html)
- Security updates for [INTEL-SA-INTEL-SA-00960](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html)
- Security updates for [INTEL-SA-INTEL-SA-01045](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html)


- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
- Update for functional issues. Refer to [13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
- Update for functional issues. Refer to [10th Gen Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
- Update for functional issues. Refer to [10th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213) for details.
- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
- Update for functional issues. Refer to [8th Generation Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
- Update for functional issues. Refer to [7th and 8th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
- Update for functional issues. Refer to [2nd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
- Update for functional issues. Refer to [Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel® Atom® C3000 Processor Product Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/336345) for details.
- Update for functional issues. Refer to [Intel® Atom® x6000E Series, and Intel® Pentium® and Celeron® N and J Series Processors for Internet of Things (IoT) Applications](https://cdrdv2.intel.com/v1/dl/getContent/636674) for details.
- Update for functional issues. Refer to [Intel® Pentium® Silver and Intel® Celeron® Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/336562) for details.
- Update for functional issues. Refer to [Intel® Pentium® Silver and Intel® Celeron® Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634542) for details.



### New Platforms

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| EMR-SP         | A-1      | 06-cf-02/87 |          | 21000200 | Xeon Scalable Gen5
| EMR-SP         | A-0      | 06-cf-01/87 |          | 21000200 | Xeon Scalable Gen5
| MTL            | C-0      | 06-aa-04/e6 |          | 0000001c | Core™ Ultra Processor

### Updated Platforms

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| ADL            | C0       | 06-97-02/07 | 00000032 | 00000034 | Core Gen12
| ADL            | H0       | 06-97-05/07 | 00000032 | 00000034 | Core Gen12
| ADL            | L0       | 06-9a-03/80 | 00000430 | 00000432 | Core Gen12
| ADL            | R0       | 06-9a-04/80 | 00000430 | 00000432 | Core Gen12
| ADL-N          | N0       | 06-be-00/11 | 00000012 | 00000015 | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
| AML-Y42        | V0       | 06-8e-0c/94 | 000000f8 | 000000fa | Core Gen10 Mobile
| BDX-NS         | A1       | 06-56-05/10 | 0e000014 | 0e000015 | Xeon D-1513N/23/33/43/53
| CFL-H          | R0       | 06-9e-0d/22 | 000000fa | 000000fc | Core Gen9 Mobile
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000f4 | 000000f6 | Core Gen9
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f4 | 000000f6 | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | P0       | 06-9e-0c/22 | 000000f4 | 000000f6 | Core Gen9 Desktop
| CLX-SP         | B0       | 06-55-06/bf | 04003604 | 04003605 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003604 | 05003605 | Xeon Scalable Gen2
| CML-H          | R1       | 06-a5-02/20 | 000000f8 | 000000fa | Core Gen10 Mobile
| CML-S102       | Q0       | 06-a5-05/22 | 000000f8 | 000000fa | Core Gen10
| CML-S62        | G1       | 06-a5-03/22 | 000000f8 | 000000fa | Core Gen10
| CML-U42        | V0       | 06-8e-0c/94 | 000000f8 | 000000fa | Core Gen10 Mobile
| CML-U62 V1     | A0       | 06-a6-00/80 | 000000f8 | 000000fa | Core Gen10 Mobile
| CML-U62 V2     | K1       | 06-a6-01/80 | 000000f8 | 000000fa | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000f8 | 000000fa | Core Gen10 Mobile
| CPX-SP         | A1       | 06-55-0b/bf | 07002703 | 07002802 | Xeon Scalable Gen3
| DNV            | B0       | 06-5f-01/01 | 00000038 | 0000003e | Atom C Series
| EHL            | B1       | 06-96-01/01 | 00000017 | 00000019 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| GLK            | B0       | 06-7a-01/01 | 0000003e | 00000040 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GLK-R          | R0       | 06-7a-08/01 | 00000022 | 00000024 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-D          | B0       | 06-6c-01/10 | 01000268 | 01000290 | Xeon D-17xx, D-27xx
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000c2 | 000000c4 | Core Gen10 Mobile
| ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003b9 | 0d0003d1 | Xeon Scalable Gen3
| JSL            | A0/A1    | 06-9c-00/01 | 24000024 | 24000026 | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| KBL-G/H/S/X/E3 | B0       | 06-9e-09/2a | 000000f4 | 000000f8 | Core Gen7; Xeon E3 v6
| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 0000411c | 00004121 | Core Gen13
| RPL-S          | B0       | 06-b7-01/32 | 0000011d | 00000122 | Core Gen13
| RPL-S          | H0       | 06-bf-05/07 | 00000032 | 00000034 | Core Gen12
| RKL-S          | B0       | 06-a7-01/02 | 0000005d | 0000005e | Core Gen11
| RPL-S/HX       | C0       | 06-bf-02/07 | 00000032 | 00000034 | Core Gen12
| RPL-U 2+8      | Q0       | 06-ba-03/e0 | 0000411c | 00004121 | Core Gen13
| SKX-SP         | B1       | 06-55-03/97 | 01000181 | 01000191 | Xeon Scalable
| SPR-SP         | E5/S3    | 06-8f-08/87 | 2b0004d0 | 2b000590 | Xeon Scalable Gen4
| SPR-SP         | E4/S2    | 06-8f-07/87 | 2b0004d0 | 2b000590 | Xeon Scalable Gen4
| SPR-SP         | E3       | 06-8f-06/87 | 2b0004d0 | 2b000590 | Xeon Scalable Gen4
| SPR-SP         | E2       | 06-8f-05/87 | 2b0004d0 | 2b000590 | Xeon Scalable Gen4
| TGL            | B0/B1    | 06-8c-01/80 | 000000b4 | 000000b6 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 | 0000004e | 00000050 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 | 00000034 | 00000036 | Core Gen11 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000f8 | 000000fa | Core Gen8 Mobile
Comment 1 Marcus Meissner 2024-03-13 10:17:48 UTC
  - Security updates for [INTEL-SA-INTEL-SA-00972](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html)
    - CVE-2023-39368: A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service.

  - Security updates for [INTEL-SA-INTEL-SA-00982](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html)
    - CVE-2023-38575: Non-transparent sharing of return predictor targets between contexts in some Intel Processors may allow an authorized user to potentially enable information disclosure via local access.
Comment 2 Marcus Meissner 2024-03-13 10:21:12 UTC
  - Security updates for INTEL-SA-INTEL-SA-00898 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
    - CVE-2023-28746: Information exposure through microarchitectural
      state after transient execution from some register files for some
      Intel Atom Processors may allow an authenticated user to potentially
      enable information disclosure via local access.
  - Security updates for INTEL-SA-INTEL-SA-00960 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
    - CVE-2023-22655 Protection mechanism failure in some 3rd and 4th
      Generation Intel Xeon Processors when using Intel SGX or Intel TDX 
      may allow a privileged user to potentially enable escalation of
      privilege via local access.
  - Security updates for INTEL-SA-INTEL-SA-01045 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
    - CVE-2023-43490: Incorrect calculation in microcode keying mechanism
      for some Intel Xeon D Processors with Intel® SGX may allow a
      privileged user to potentially enable information disclosure via
      local access.
Comment 3 OBSbugzilla Bot 2024-03-13 11:55:02 UTC
This is an autogenerated message for OBS integration:
This bug (1221323) was mentioned in
https://build.opensuse.org/request/show/1157541 Factory / ucode-intel
Comment 5 Maintenance Automation 2024-03-22 12:32:40 UTC
SUSE-SU-2024:0917-1: An update that solves five vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221323
CVE References: CVE-2023-22655, CVE-2023-28746, CVE-2023-38575, CVE-2023-39368, CVE-2023-43490
Maintenance Incident: [SUSE:Maintenance:32950](https://smelt.suse.de/incident/32950/)
Sources used:
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 ucode-intel-20240312-134.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 ucode-intel-20240312-134.1
SUSE Linux Enterprise Server 12 SP5 (src):
 ucode-intel-20240312-134.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2024-04-08 12:30:58 UTC
SUSE-SU-2024:1139-1: An update that solves five vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221323
CVE References: CVE-2023-22655, CVE-2023-28746, CVE-2023-38575, CVE-2023-39368, CVE-2023-43490
Maintenance Incident: [SUSE:Maintenance:32951](https://smelt.suse.de/incident/32951/)
Sources used:
openSUSE Leap Micro 5.3 (src):
 ucode-intel-20240312-150200.38.1
openSUSE Leap Micro 5.4 (src):
 ucode-intel-20240312-150200.38.1
openSUSE Leap 15.5 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro 5.3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro 5.4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro 5.5 (src):
 ucode-intel-20240312-150200.38.1
Basesystem Module 15-SP5 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 ucode-intel-20240312-150200.38.1
SUSE Manager Proxy 4.3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Manager Retail Branch Server 4.3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Manager Server 4.3 (src):
 ucode-intel-20240312-150200.38.1
SUSE Enterprise Storage 7.1 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro 5.1 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro 5.2 (src):
 ucode-intel-20240312-150200.38.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
 ucode-intel-20240312-150200.38.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Marcus Meissner 2024-05-15 09:47:31 UTC
done