Intel Posts Updated CPU Microcode For Two More SGX Vulnerabilities, Privilege Escalation Bug

Written by Michael Larabel in Intel on 15 February 2023 at 12:00 AM EST. 1 Comment
INTEL
Patch Tuesday brought AMD disclosing a Ryzen Master security issue on Windows and the Cross-Thread Return Address Predictions bug requiring new handling by Linux's KVM. Over on the Intel side they have disclosed nearly three dozen new issues and as a result also published new Linux CPU microcode files for their recent processors to address the disclosures.

The Valentine's Day disclosures can be found via the Intel Security Center and range from their ON Event Android app to QATzip to Iris Xe MAX driver issues on Windows to CPU issues.

Intel today published new CPU microcode for Linux users and that is in reference to three new vulnerability disclosures in particular:

INTEL-SA-00767 - "A potential security vulnerability in some Intel® Processors with Intel® Software Guard Extensions (SGX) may allow information disclosure...Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access."

INTEL-SA-00738 - "A potential security vulnerability in some Intel® Xeon® Processors with Intel® Software Guard Extensions (SGX) may allow escalation of privilege... Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access."

INTEL-SA-00700 - "A potential security vulnerability in some Intel® Atom® and Intel® Xeon® Scalable Processors may allow escalation of privilege....Insufficient granularity of access control in out-of-band management in some Intel(R) Atom® and Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access."

The latter two have a CVSS base score of "high" while the first has a "medium" rating and these three are what led to today's Intel CPU microcode updates for Linux users.

Intel Xeon and Core Gen13 CPUs


The Intel 20230214 microcode drop covers Intel Core Gen11 through Core Gen13 Raptor Lake, Xeon Scalable of all generations, select Pentium processors, Core Gen10 Mobile, Xeon D Ice Lake, and other select processors. This is also the first time the CPU microcode has seen updates for the new 4th Gen Xeon Scalable "Sapphire Rapids" processors, including the new Xeon CPU Max Series and on the client side for Raptor Lake P / H / U.

The Intel 20230214 CPU microcode files should be working their way to Linux distribution stable release updates shortly while those interested in fetching the new CPU microcode right away can find them via GitHub.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week