-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 12 Aug 2024 09:59:32 -0300
Source: amd64-microcode
Architecture: source
Version: 3.20240710.2~deb11u1
Distribution: bullseye
Urgency: high
Maintainer: Henrique de Moraes Holschuh <
hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <
hmh@debian.org>
Closes: 1000193 1062678 1074514 1076128
Changes:
amd64-microcode (3.20240710.2~deb11u1) bullseye; urgency=high
.
* Rebuild for bullseye
* Revert merged-usr changes from unstable
* Revert move to non-free-firmware
.
amd64-microcode (3.20240710.2) unstable; urgency=high
.
* postrm: activate the update-initramfs dpkg trigger on remove/purge
instead of always executing update-initramfs directly, just like it
was done for postinst in 3.20240710.1: call update-initramfs directly
only if the dpkg-trigger activation call fails.
.
amd64-microcode (3.20240710.1) unstable; urgency=high
.
* Update package data from linux-firmware 20240709-141-g59460076
(closes: #1076128)
* SECURITY UPDATE: Mitigates "Sinkclose" CVE-2023-31315 (AMD-SB-7014) on
AMD Epyc processors: SMM lock bypass - Improper validation in a model
specific register (MSR) could allow a malicious program with ring 0
access (kernel) to modify SMM configuration while SMI lock is enabled,
potentially leading to arbitrary code execution.
Note: a firmware update is recommended for AMD Epyc (to protect the
system as early as possible). Many other AMD processor models are
also vulnerable to SinkClose, and can only be fixed by a firmware
update at this time.
* Updated Microcode patches:
+ Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f
+ Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c
+ Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a
+ Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248
+ Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215
+ Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238
+ Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148
+ Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5
* README.Debian: "late" microcode updates are unsupported in Debian
(closes: #1074514)
* postinst: use dpkg-trigger to activate update-initramfs, this enables
dracut integration (closes: #1000193)
.
amd64-microcode (3.20240116.2) unstable; urgency=medium
.
* Add AMD-TEE firmware to the package (closes: #1062678)
+ amdtee: add amd_pmf TA firmware 20230906
* debian: install amdtee to /lib/firmware/amdtee
* debian/control: update short and long descriptions
* debian/copyright: update with amd-pmf license
.
amd64-microcode (3.20240116.1) unstable; urgency=medium
.
* Update package data from linux-firmware 20240115-80-gb4b04a5c
* Updated Microcode patches:
+ Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107b
+ Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d3
+ Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001236
.
amd64-microcode (3.20231019.1) unstable; urgency=medium
.
* Update package data from linux-firmware 20231019
* Updated Microcode patches:
+ Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101144
+ Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101244
+ Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00213
.
amd64-microcode (3.20230823.1) unstable; urgency=medium
.
* Update package data from linux-firmware 20230919
* New AMD-SEV firmware from AMD upstream (20230823)
+ Updated SEV firmware:
Family 19h models 00h-0fh: version 1.55 build 8
+ New SEV firmware:
Family 19h models 10h-1fh: version 1.55 build 21
* amd-ucode: Add note on fam19h warnings.
Checksums-Sha1:
192886bc93d93450751d393a985a6ebe7dbbd697 1718 amd64-microcode_3.20240710.2~deb11u1.dsc
dad8b8c2cc53ec44d7fbce002f25e41ebaf83ecd 172208 amd64-microcode_3.20240710.2~deb11u1.tar.xz
f3c40f8a5da7501ec66687debc143285e96dc9c9 6066 amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo
Checksums-Sha256:
76aa9e8b2f5aaed41bd526515e662a9c6ab458c3c8ef70c8aa7fe1cbd78b9315 1718 amd64-microcode_3.20240710.2~deb11u1.dsc
56d35405e8e40d8798549c5210a7709862a3d50f72bd501149454014437a09f4 172208 amd64-microcode_3.20240710.2~deb11u1.tar.xz
c55198edb93777593d0b2a29088af1895fc398632dfb2cfb80d2631a1492a4ae 6066 amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo
Files:
a0f0c9bc500592f5ad4d6e3d20d6ba7e 1718 non-free/admin standard amd64-microcode_3.20240710.2~deb11u1.dsc
7249bbf0ce98784715035d5de2ae400e 172208 non-free/admin standard amd64-microcode_3.20240710.2~deb11u1.tar.xz
0337f9ff6c1b8ae4f5728769b05bcd0b 6066 non-free/admin standard amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEpvbMGUAhfu+gsYOwlOXoPKamj0cFAma6CO4ACgkQlOXoPKam j0d/cw//ShhMW70J6kqDgDUQHonuOn+gbkNYobrPxTlTsMx6CivbgmJY00oN641E EuqMyLibZRmhhM/bAiMZ8MsPNnmp5fMu/2OVy9OpAAt/26XrgrVGj2775joMJPS8 15YLvcLw3rFHwfRIa7bXk4vjNxovD48DBxqviNsH6KCgAjJPDf2GIen6qw1ZGNWp CsXG+LwKsj59BmSqFMsw7I2Okg9jmPcZoY9Pj3Sah0zlJyod9qZDSsiMCiw3IRqK sPjHD+A+1ud5TmnGnPdjrkkmDf7n1PvGey48yk3MaBwEosfvLCzL7JKAG4+P6LKM +P/4ORkk0TV1snCBjlPRO320h7QfJWRQ5gtH8WV2XexPC+jxbgSvnLOmZ6uz1Il9 Q/JjW34tM3r2ajuCxxWyS02zWvnAoj/KOYWtHaoGOAfW8WkasQOL66nK/j++enpa NJurY4AXuXK2RK7uLA98Xaav0txBK215WN56qK0PCVrJBlrZMqctMSb/zyi9QpB6 G3lh+OW5gqLz8zNeabqK1PPu4dJFdnYFGXHvpkJ9D9+M+/GRIu14tyZAl8qp3eYy tZshFbBGfsFr8lLGcCW3fl4ctueYLVH+w1nL8NeCs7n+wzpIPlwEKe4OKN65rAiP aVlUhx9QQrVuzWbY46xJm78xXJFS+0KO/WA95eCGV0Ojk9AOokU=
=6stt
-----END PGP SIGNATURE-----
--==============à61145474430268865=Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
iHUEABYIAB0WIQTziqJOuF8J+ZI8pJSb9qggYcy5IQUCZsZPEAAKCRCb9qggYcy5 Ib0XAP9iJir0CfhlHfT4H+PXXfVat0hhHtqZ8ymBexG5fvBl0AEA6HyY1yIRqVut hMDdlvV2JkI65LAlKJMirUPXsmmEPwY=MflT
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)