retitle 907402 intel-microcode: sig 0x206c2 (2nd Gen i7, Xeon 5600) update 
missing
thanks

> Then I checked the contents of the package and I noticed that the
> microcode file (intel-ucode/06-2c-02) for my CPU (Xeon E5620) is
> missing.  This microcode is present in the archive
> (microcode-20180807.tgz) downloaded from Intel's site and can be
> loaded manually.
> 
> Is this intentional and should we expect a new package with additional
> microcodes included?

Yes, it is intentional.

The text for Intel SA-00030 makes it clear that some platforms are not
to have that specific microcode updated without the corresponding BIOS
update, as the microcode requires an up-to-date SINIT ACM (Intel
TXT/vPRO firmware component).

When you update just the microcode in such a machine, according to my
reading of the text in the Intel SA-00030 advisory, it will disable
Intel TXT until you somehow manage to update the BIOS.  Worse, that
change cannot be undone by just removing the microcode update: it
supposedly modifies the contents of the platform TPM, which is a
persistent change that cannot be undone.

If the BIOS is using Intel TXT to implement secure boot, that may brick
the machine since it will disable Intel TXT, etc.   If the BIOS is not
in secure mode, it should not cause issues -- but this is *not* certain.

References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00030.html

Intel SA-00030 excerpt:

  Recommendations: 

    [...] If your BIOS includes an SINIT ACM, which is more common for
    Intel® TXT server platforms, a BIOS update that includes the updated
    SINIT ACM should be installed; please contact your platform OEM.
    Intel is also providing microcode updates, which will revoke
    vulnerable SINIT ACMs by causing GETSEC[SENTER] to fail.  The BIOS
    update that contains the new microcode patch should be installed on
    all affected systems. Note that prior to installing the microcode
    update, an updated SINIT ACM must be installed to launch your Intel
    TXT enabled software.  Contact your solutions provider or Intel®TXT
    software vendor if your Intel®TXT environment fails to launch and to
    determine how to update your software with the new SINIT ACM. Intel
    highly recommends that these updates be applied to mitigate this
    issue.

Evidently, just about everyone else is distributing this microcode
update (0x206c2) since Intel did finally include it in a public
distribution (after an hiatus of *years* refusing to distribute any of
the dozens of microcode updates 0x206c2 had in the meantime, and those
were *security* fixes that they distributed for several other processors
including 1st gen i7 and Xeon 5500).

The fact is that Debian has had that blacklisting in place for a while
now, and Intel for a long time acted as if that microcode update was
something not to be trifled with.  There is no way we can simply remove
it without being reasonably sure it is safe to do so.

If you are *not* using Intel TXT in your 2nd gen Core i7 or Xeon 5600
(as in: it is not present at all, or it is very much *disabled* in the
BIOS *and* all secure-<anything> is also disabled in the BIOS) as far as
I know it should be reasonably safe to manually add the 0x206c2 update
to "/usr/share/misc/intel-microcode-206c2.bin".  The intel-microcode
package will detect, and use it (issue "update-initramfs -u" to refresh
the microcode in the initramfs).  If you do this, please ensure that
data file is owned by root, and can only be written to by root.

-- 
  Henrique Holschuh

Reply via email to