[Bug 1977701] Re: Update to latest upstream release 20220510 / IPU 2022.1 to fix multiple security vulnerabilities

Alex Murray 1977701 at bugs.launchpad.net
Wed Jun 15 01:30:48 UTC 2022


FYI to clarify - these were tested by enabling -proposed as per
https://wiki.ubuntu.com/Testing/EnableProposed

# enable proposed so we can install intel-microcode from there
# https://wiki.ubuntu.com/Testing/EnableProposed

cat <<EOF | sudo tee /etc/apt/sources.list.d/ubuntu-$(lsb_release -cs)-proposed.list
# Enable Ubuntu proposed archive
deb http://archive.ubuntu.com/ubuntu/ $(lsb_release -cs)-proposed restricted main multiverse universe
EOF

cat <<EOF | sudo tee /etc/apt/preferences.d/proposed-updates
# Configure apt to allow selective installs of packages from proposed
Package: *
Pin: release a=$(lsb_release -cs)-proposed
Pin-Priority: 400
EOF

sudo apt update


Then installed as:

sudo apt install intel-microcode/$(lsb_release -cs)-proposed

And rebooted to test the machine boots correctly.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to intel-microcode in Ubuntu.
https://bugs.launchpad.net/bugs/1977701

Title:
  Update to latest upstream release 20220510 / IPU 2022.1 to fix
  multiple security vulnerabilities

Status in intel-microcode package in Ubuntu:
  New
Status in intel-microcode source package in Bionic:
  Fix Committed
Status in intel-microcode source package in Focal:
  Fix Committed
Status in intel-microcode source package in Impish:
  Fix Committed
Status in intel-microcode source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

   * Users are vulnerable to multiple security issues, including MMIO
  stale data
  (https://www.intel.com/content/www/us/en/developer/articles/technical/software-
  security-guidance/advisory-guidance/processor-mmio-stale-data-
  vulnerabilities.html)
  (https://www.intel.com/content/www/us/en/security-
  center/advisory/intel-sa-00615.html)

   * Normally the security team would release updates direct to the
  -security pocket but since the associated kernels are being published
  via -updates *and* to allow phased updates to be used, it is preferred
  to publish these via -updates first, then they can be synced to
  -security once fully phased.

  [Test Plan]

   * install the updated intel-microcode packages and reboot the system

  [Where problems could occur]

   * Historically there have been issues where intel-microcode updates
  resulted in machines that fail to boot. This has usually been the case
  when a machine is using an old BIOS and the microcode which is loaded
  in early boot is much newer. Intel have increased their own internal
  testing to try and ensure this is detected before releasing to
  production.

  Also these updates have now been in -proposed for over a week without
  any mention of issues *plus* they have been tested extensively via
  testflinger on the Canonical certification lab's suite of machines
  too.

  Finally, in this unlikely case, users can boot via the '(recovery
  mode)' menu entries in grub which disables early microcode loading
  from the initrd to workaround this and then rollback the microcode
  update directly.

  [Other Info]
   
  Intel released version 20220510 / IPU 2022.1 earlier in May to address multiple vulnerabilities, including:

      - CVE-2022-21151, INTEL-SA-00617
      - CVE-2021-0146,  INTEL-SA-00528
      - CVE-2021-0127,  INTEL-SA-00532

  This version is already packaged in Ubuntu 22.10 (kinetic).

  Earlier today Intel disclosed another set of vulnerabilities (MMIO
  stale data) which are also fixed by these updates.

  
  Whilst this is a security update, to allow for increased testing before being more widely deployed the Ubuntu Security team are wishing to publish this first via -proposed and then to -updates so they can be phased along with the associated kernel updates for MMIO stale data as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1977701/+subscriptions




More information about the foundations-bugs mailing list