Debian releases security update to fix Microarchitecture Data Sampling hardware vulnerabilities

Debian rejects Intel's microcode update

The Debian project team today released a new security update for Intel microcode firmware to fix the recently disclosed Intel MDS (Microarchitecture Data Sampling) vulnerability. On May 14 this year, Intel disclosed four new security vulnerabilities affecting many of its Intel microprocessor families, but it quickly released a security upgrade to mitigate these vulnerabilities, but not all processor families have been patched.

Debian rejects Intel's microcode update

A new version of Intel Microcode Firmware has been released for this Debian project to mitigate Intel MDS (Microarchitecture Data Sampling) hardware vulnerabilities, including (CVE-2018-12126 (MSBDS), CVE-2018-12127 (MLPDS) for Sandy Bridge CVE-2018-12130 (MFBDS) and CVE-2019-11091 (MDSUM) for Server and Core-X CPU.

Moritz Muehlenhoff said in the mailing list announcement:

“This update provides additional support for some Sandybridge server
and Core-X CPUs which were not covered in the original May microcode
release.”

If you are running the latest Debian GNU / Linux 9 “Stretch” operating system series, the Debian project recommends that you update the Intel-microcode firmware to version 3.20190618.1~deb9u1 as soon as possible and install the latest Linux kernel update released last month. To update your Debian GNU / Linux computer, simply open the terminal emulator or access the console and type the “sudo apt-get update && sudo apt-get full-upgrade” command.