Bug 2230834 - Release new intel-ucode firmwares with CVE-2022-40982 (GDS vulnerability) fix
Summary: Release new intel-ucode firmwares with CVE-2022-40982 (GDS vulnerability) fix
Keywords:
Status: CLOSED DUPLICATE of bug 2230086
Alias: None
Product: Fedora
Classification: Fedora
Component: microcode_ctl
Version: 37
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Eugene Syromiatnikov
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-08-10 07:15 UTC by Petr Pisar
Modified: 2023-08-14 07:41 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2023-08-14 07:41:45 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Petr Pisar 2023-08-10 07:15:35 UTC
Intel has released a new set of firmwares fixing CVE-2022-40982 (INTEL-SA-00828 <https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html>).

E.g. for my processor it's /lib/firmware/intel-ucode/06-8e-0c file. The affected microcode_ctl-2.1-53.1.fc37.x86_64 contains 0xf6 revision (2022-12-26), while latest upstream fixing the vulnerability has 0xf8 revision (2023-02-26 date).

Since Linux 6.4.9, one can observe status of the fix in "Gather data sampling" field of lscpu output and in "GDS" line in dmesg output:

$ dmesg -t | grep -E 'GDS|microcode'
microcode: updated early: 0xf0 -> 0xf6, date = 2022-12-26
GDS: Vulnerable: No microcode
microcode: Microcode Update Driver: v2.2.

$ dmesg -t | grep -E 'GDS|microcode'
microcode: updated early: 0xf0 -> 0xf8, date = 2023-02-26
GDS: Mitigation: Microcode
microcode: Microcode Update Driver: v2.2.

The updated firmware blobs can be downloaded from <https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/main/intel-ucode> as linked from the Intel security advisory.

Comment 1 Eugene Syromiatnikov 2023-08-14 07:41:45 UTC

*** This bug has been marked as a duplicate of bug 2230086 ***


Note You need to log in before you can comment on or make changes to this bug.