Security

Patches

Intel says Friday's mystery 'security update' microcode isn't really a security update

We're all for encouraging people to squash bugs but this is an odd way to do it


False alarm: despite a patch notes suggesting otherwise, that mysterious blob of microcode released for many Intel microprocessors last week was not a security update, the x86 giant says.

In an email Monday, an Intel spokesperson told The Register that microcode-20230512, which popped up on the manufacturer's GitHub page “does not contain any security updates and the note, [INTEL-SA-NA], is meant to convey that there are no applicable (Not Applicable) security updates in the package.”

The update caught many users attention over the weekend as it affected nearly every Intel CPU going back to 2017. This includes most of Intel’s latest chips, such as its 13th-gen Core-series parts and 4th-Gen Xeon Scalable datacenter parts.

Unfortunately, Intel isn’t being forthcoming about what exactly the patch does. Its purpose was simply listed as “security updates for Intel-SA-NA,” which many, including Phoronix, took to the NA to mean it was a security update with a release advisory “not available.” We now know it meant “not applicable,” and that the update simply contains “functional updates.”

The Register has asked Intel for additional information on what these updates entail, and we'll let you know when the silicon slinger is ready to talk.

It’s also unclear whether Intel chose not to patch older parts, or if they’re not affected. We’ll note that Microsoft Windows 11 doesn’t support Intel processors older than 8th-gen, so that may be part of the reasoning behind the deployment.

Microcode releases aren’t uncommon, can address and improve all kinds of low-level operations in modern processors, and can include mitigations for chip-level vulnerabilities. However, they’ve become a point of concern for many customers, as these sorts of security fixes can have a severe impact on performance.

For instance, the Spectre and Meltdown side-channel weaknesses we exposed back in early 2018 could be exploited by rogue software or insiders to extract sensitive information, such as cryptographic keys and authentication tokens, from memory that should otherwise be out of reach. Intel released patches for affected CPU cores, though the cure wasn’t always without side effects; some of the updates could hit performance dramatically or not, depending on what you're running and whether other mitigations were in place.

In any case, last week’s mystery microcode is already making its way out to Linux users — many distros will apply them as part of their security updates — while we anticipate the release will find its way out to Windows and Mac users before long.

Intel’s comments would seem to rule out any connection to the leak of BootGuard private OEM keys alongside a treasure trove of data stolen from MSI back in April.

In a nutshell, these keys ensure that only signed firmware releases can be applied to a system, preventing an attacker from injecting malicious code before the OS boots. With these keys now out in the wild, it’s technically possible for an attacker to sign their malware so it appears legitimate. ®

Send us news
7 Comments

Intel shows off backside power and stacked transistors at IEDM

Chip giant claims demo tech could 'significantly' improve device density

Intel scores a reprieve in $2.18B VLSI patent case after court orders retrial

The never-ending IP story goes on

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

UEFI flaws allow bootkits to pwn potentially hundreds of devices using images

Exploits bypass most secure boot solutions from the biggest chip vendors

New York set to host $10B semiconductor research facility with IBM and Micron

Elsewhere, BAE Systems bags first CHIPS Act funding

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Brit bendy chip firm Pragmatic scores funding to boost production

Semiconductor bods get cash injection after threatening to quit UK over lack of government support

Cisco intros AI to find firewall flaws, warns this sort of thing can't be free

Predicts cyber crims will find binary brainboxes harder to battle

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

German budget woes threaten chip fab funding for Intel and TSMC

Constitutional court tells govt: Er, about that €60B you handed out... it's not legal

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion