• Accepted amd64-microcode 3.20250311.1~deb12u1 (source) into proposed-up

    From Debian FTP Masters@21:1/5 to All on Sat Jun 21 18:20:01 2025
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    Format: 1.8
    Date: Fri, 20 Jun 2025 11:36:35 -0300
    Source: amd64-microcode
    Architecture: source
    Version: 3.20250311.1~deb12u1
    Distribution: bookworm
    Urgency: medium
    Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
    Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
    Closes: 1095470
    Changes:
    amd64-microcode (3.20250311.1~deb12u1) bookworm; urgency=medium
    .
    * Rebuild for bookworm (revert merged-usr changes from unstable)
    .
    amd64-microcode (3.20250311.1) unstable; urgency=medium
    .
    * Update package data from linux-firmware 20250311
    * New AMD-SEV firmware from AMD upstream (20250221)
    * SECURITY UPDATE (AMD-SB-3019 / CVE-2024-56161):
    Update remote attestation to be compatible with AMD systems with
    up-to-date firmware (i.e. which fixes "EntrySign"), and update
    AMD-SEV for AMD-SB-3019 mitigations. Note that this AMD-SEV
    update DOES NOT FIX the microcode "EntrySign" vulnerability.
    (closes: #1095470)
    + Updated SEV firmware:
    Family 17h models 30h-3fh: version 0.24 build 20
    Family 19h models 00h-0fh: version 1.55 build 29
    Family 19h models 10h-1fh: version 1.55 build 39
    Family 19h models a0h-afh: version 1.55 build 39
    + New SEV firmware:
    Family 1ah models 00h-0fh: version 1.55 build 54
    * New AMD microcode updates from AMD upstream (20241121)
    + Add patches for many (non-server) family 19h processors
    * Updated Microcode patches:
    + Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a0000a
    * New Microcode patches:
    + Family=0x17 Model=0x60 Stepping=0x01: Patch=0x0860010d
    + Family=0x17 Model=0x68 Stepping=0x01: Patch=0x08608108
    + Family=0x17 Model=0x71 Stepping=0x00: Patch=0x08701034
    + Family=0x19 Model=0x08 Stepping=0x02: Patch=0x0a00820c
    + Family=0x19 Model=0x18 Stepping=0x01: Patch=0x0a108108
    + Family=0x19 Model=0x21 Stepping=0x00: Patch=0x0a20102d
    + Family=0x19 Model=0x21 Stepping=0x02: Patch=0x0a201210
    + Family=0x19 Model=0x44 Stepping=0x01: Patch=0x0a404107
    + Family=0x19 Model=0x50 Stepping=0x00: Patch=0x0a500011
    + Family=0x19 Model=0x61 Stepping=0x02: Patch=0x0a601209
    + Family=0x19 Model=0x74 Stepping=0x01: Patch=0x0a704107
    + Family=0x19 Model=0x75 Stepping=0x02: Patch=0x0a705206
    + Family=0x19 Model=0x78 Stepping=0x00: Patch=0x0a708007
    + Family=0x19 Model=0x7c Stepping=0x00: Patch=0x0a70c005
    Checksums-Sha1:
    a65f75dee9ee1069927c50347a0f0a48fce37ccd 1727 amd64-microcode_3.20250311.1~deb12u1.dsc
    159e6cea59289b40488aa8b8b2ad518530c93a13 282888 amd64-microcode_3.20250311.1~deb12u1.tar.xz
    01b8b2292f36d78e10e2f0f0dc0d4db61b0d6167 6355 amd64-microcode_3.20250311.1~deb12u1_amd64.buildinfo
    Checksums-Sha256:
    132a3e5e51fb8914e1751363938c67727513253062de7a4475ef54fbd1886ccf 1727 amd64-microcode_3.20250311.1~deb12u1.dsc
    339072905ad809c3fe0371ccb1d62b590586a28142e3438842675d811b94fd95 282888 amd64-microcode_3.20250311.1~deb12u1.tar.xz
    5a36acb23faf85afc415d789f978f9f18554eaefbfd612471ce1e8b50f04825e 6355 amd64-microcode_3.20250311.1~deb12u1_amd64.buildinfo
    Files:
    397a07cc377bcdfac5818e766129fe98 1727 non-free-firmware/admin standard amd64-microcode_3.20250311.1~deb12u1.dsc
    3fe5156911773c35d50bc742b8d99bbf 282888 non-free-firmware/admin standard amd64-microcode_3.20250311.1~deb12u1.tar.xz
    5347948f9640f55f042007c95c83cfda 6355 non-free-firmware/admin standard amd64-microcode_3.20250311.1~deb12u1_amd64.buildinfo

    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpvbMGUAhfu+gsYOwlOXoPKamj0cFAmhVdEMACgkQlOXoPKam j0epAA//REYnziwso3f6ExK/M/qQp9G/ABd4+YTficxX18KhhVd/KmEDt8uixQOe Ed8ehD+d1K+w89000gtepULrK53PdhoywSPsKjMw6U1KDFmZboW67vnqs+enMNRs y8XDQ6xjvxukdj1BqlhhpsT35coDhueumWaeZ0pEzX/7klb423UGOsdHjeSPZw79 9pCfJc+JOxWWl8qvqflhag0XZ8nuATPPEOWpdqMQ0bQM/11z7LBFx3FTgzpexqrF MPEWornrCd/wPc+sLzD3WaEUM0WW7KuqHFy7EKcWTCMnNMCfES3E042eJKTQ28Mw BBgmT5q/tzhd97/JMtI0HEcaXLIyl64ihn2VQ2e5bmo3qSSpZCs+H1OtDnHxXuj8 FQTHlOSHASvUCYCfEouanEUs6mgrigvHvXKwlRBEJCguYV8V51vv7XqaisC5Pbbk VaWaw7AdXKpMgybBtSzHX+FXbU++wZO4sZbq2jJzcYKnRTao/ZmTv3f8jfyyHCC3 qZbNRujuCxVj+xOmPrxDbPPoj+sS78Ymm/SM6nG2rvLbt0b8oarB2j5aCNdDnu3o 8GgjYFRKdgzTmcNjl4HZ7xSrbCkTNSDFala7DXLPimIWE7jrtM/XnzCjGGrw1bvV 4AGw6UaKa+tmSAEcyaA1+CrW8AdhrpGJKyKBx7U/uIP0TbqZUN8=
    =Y24v
    -----END PGP SIGNATURE-----


    --==============ë25334670710680643=Content-Type: application/pgp-signature

    -----BEGIN PGP SIGNATURE-----

    iHUEABYIAB0WIQTziqJOuF8J+ZI8pJSb9qggYcy5IQUCaFbbBAAKCRCb9qggYcy5 IUnUAQCxDaiwtuLQlu2BV2Ln7CtpFRJN9C4+ULZyXW+twXDNDwEA1sCIR7n9EYtp jJWTjKS3JKzOLvzWHf4BeJNqhb+vqgs=snQ/
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)