• Accepted intel-microcode 3.20250211.1~deb12u1 (source) into proposed-up

    From Debian FTP Masters@21:1/5 to All on Sat Mar 8 17:20:02 2025
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    Format: 1.8
    Date: Sat, 08 Mar 2025 09:15:30 -0300
    Source: intel-microcode
    Architecture: source
    Version: 3.20250211.1~deb12u1
    Distribution: bookworm
    Urgency: medium
    Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
    Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
    Closes: 1095805
    Changes:
    intel-microcode (3.20250211.1~deb12u1) bookworm; urgency=medium
    .
    * Build for bookworm
    * All trixie-only changes (from 3.20240813.2) are reverted on this branch
    .
    intel-microcode (3.20250211.1) unstable; urgency=medium
    .
    * New upstream microcode datafile 20250211 (closes: #1095805)
    - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
    Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
    Processors may allow privileged user to potentially enable denial of
    service via local access.
    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
    Improper access control in the EDECCSSA user leaf function for some
    Intel Processors with Intel SGX may allow an authenticated user to
    potentially enable denial of service via local access. Intel disclosed
    that some 9th Generation Intel Core processor models were already fixed
    by a previous microcode update.
    - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
    CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
    CVE-2024-31157, CVE-2024-28047)
    Improper input validation, insufficient granularity of access control,
    and improper initialization issues in UEFI firmware for some Intel
    processors may allow escalation of privilege, denial of service, or
    information disclosure. An UEFI firmware update is needed for complete
    mitigation.
    - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
    Improper handling of physical or environmental conditions in some 13th
    and 14th Generation Intel Core Processors may allow an authenticated
    user to enable denial of service via local access. An UEFI firmware
    update may be required for complete mitigation.
    - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
    Sequence of processor instructions leads to unexpected behavior in the
    Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
    user to potentially enable denial of service via local access.
    - Fixes for unspecified functional issues on several processor models
    * New microcodes or new extended signatures:
    sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
    sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
    sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
    sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
    * Updated microcodes:
    sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
    sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
    sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
    sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
    sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
    sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
    sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
    sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
    sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
    sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
    sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
    sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
    sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
    sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
    sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
    sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
    sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
    sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
    sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
    sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
    sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
    sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
    sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
    sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
    sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
    sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
    sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
    sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
    * source: update symlinks to reflect id of the latest release, 20250211
    * Update changelog for 3.20240813.1 with new information
    Checksums-Sha1:
    f13972eb72864e029160ca12177eaa64989127d3 1830 intel-microcode_3.20250211.1~deb12u1.dsc
    d5da424054ec1f12c05e08b8556fa8059435a4d9 9222528 intel-microcode_3.20250211.1~deb12u1.tar.xz
    2c74aa13070b27ce368f3a6253e2698af0f64e89 6234 intel-microcode_3.20250211.1~deb12u1_amd64.buildinfo
    Checksums-Sha256:
    3dd261a375996148237fd833a9d312428052c9665f285a49ff2b0368c26881cd 1830 intel-microcode_3.20250211.1~deb12u1.dsc
    caed9872b1ca96475922d93aaf9d296923329912a64f0030a253d28e89dbab77 9222528 intel-microcode_3.20250211.1~deb12u1.tar.xz
    0b75bbaea6a878b51df80dd22d9ec69a0524c09af640d11f7de66c5d0cff26c4 6234 intel-microcode_3.20250211.1~deb12u1_amd64.buildinfo
    Files:
    ad24d6e6b757d5dc57c06ed12282a265 1830 non-free-firmware/admin standard intel-microcode_3.20250211.1~deb12u1.dsc
    57eafaf8b1f64d9d67d7f8b4cde6e197 9222528 non-free-firmware/admin standard intel-microcode_3.20250211.1~deb12u1.tar.xz
    809160825733977bc366ae64395679c3 6234 non-free-firmware/admin standard intel-microcode_3.20250211.1~deb12u1_amd64.buildinfo

    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpvbMGUAhfu+gsYOwlOXoPKamj0cFAmfMO+UACgkQlOXoPKam j0dXSxAAkEqh+5ITnMK25sxYofmwLktczdA3+3+MlE64PFLpXCuahN0QDAQc+14w 5HNzCehK8Kg4Ysa49YHQb945YmouLpq4rbZFQr+AodeoFfO0RsP+8YCq4z+8xMVR W7ddzMwf/b0szXZuLTxMnemwb8ZVWMkad5PUu2nG0q2bq473Qj3q4zGHt378FMKN hgNgs65KEeKjbKdQs9yQ2rvDmh7jfNpwWv7hXIR2Iapgk+VYoNZc9INOnKl4ws8B 3b9+zwKz+Rx8LM2TJ+SQ0YyCuH7dT9fQp25dASI2lIJax1Ffkzg+/TIzWoYBaqX1 oY3uzpy6HivmRExpcO4UB1eNVlh2dOFQhqAtbtZyLBzcg1U21/j06W0zx1yh5SU7 S956aazKSufyWnWjL5Vk1F4c9/0+7S8f2j9ME8+dIa/ox5HCAEzr4wK6YOQ6iTXM HCVYxk1oOY3ofo4WBz09Zx67Lzhs7tUcbLd0w9E/W2M53M98IdvTKJHJFtp1Twa0 hJHaPfIQig0FrH/BtZTm16koEvDrSAjbBJVywXen0BfSuoAuJHK2dDF17lpzRxVk uRUiGJRBrPr1kpBr4zMw/P+FDX2BPCB7x4/K0XKeH824OqZEeLFHWeUIp9aJqWOS T0VbB8c+opXHxM5yld6cJTazDNSgxqrRJvN4WFb4jNK0qbkuDKE=
    =9miT
    -----END PGP SIGNATURE-----


    --==============§20706208711683038=Content-Type: application/pgp-signature

    -----BEGIN PGP SIGNATURE-----

    iHUEABYIAB0WIQTziqJOuF8J+ZI8pJSb9qggYcy5IQUCZ8xthgAKCRCb9qggYcy5 IUa/AQDqfA5IucI6qYd5T/wkmm1uINjRNIBq3BiM9pbx/dj1AwEAqbTLhe8EaOBG LCxJC8vvh7XIEF0K/Pyn9Ua3CYiQ+gM=KSiB
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)