Accepted intel-microcode 3.20230214.1 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted intel-microcode 3.20230214.1 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Wed, 15 Mar 2023 15:19:35 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: intel-microcode_3.20230214.1_source.changes
- Debian-source: intel-microcode
- Debian-suite: unstable
- Debian-version: 3.20230214.1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=g16nbCZf1+3wcswHMceHaQ4F1/Y17muLTeOsPbh6B70=; b=ZHRg5yaSjW7NMItKCBOgNObEb7 Bravg99V/7t8I0mzne+g1uIRqe3LoRtHncLatr6hUofq10uKIb101mIOEg3rjxJcIzEsjS15ndmhZ D9RObijs5Ao66lY2LqVokE3VBbvZwN+dHzAF9WF7rQhsVWZk4gf/mQc0zN/4vlONmkCEQrWyk7vND eBpIcfMpWo2zuGi6bxLJ9z78ewBzIth5cYLfdrkGSaERD81Kc0q75+Cao0RLjxoO+Ezcbl29zKdBg qyhnm/zU8Pu6MLZIezgw8FhgWbzBktoQvE4kAarSuT8uppcxbGx0zJEIfFABEMM99MFO9TwcnxP5S 6Ei5T5Hw==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pcSud-006uGb-0B@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 14 Mar 2023 19:17:02 +0100
Source: intel-microcode
Architecture: source
Version: 3.20230214.1
Distribution: unstable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Tobias Frost <tobi@debian.org>
Closes: 1031334
Changes:
intel-microcode (3.20230214.1) unstable; urgency=medium
.
* Non-maintainer upload.
* New upstream microcode datafile 20230214
- Includes Fixes for: (Closes: #1031334)
- INTEL-SA-00700 (CVE-2022-21216):
Insufficient granularity of access control in out-of-band management
in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a
privileged user to potentially enable escalation of privilege via
adjacent network access.
- INTEL-SA-00730 (CVE-2022-33972):
Incorrect calculation in microcode keying mechanism for some 3rd
Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged
user to potentially enable information disclosure via local acces
- INTEL-SA-00738 (CVE-2022-33196):
Incorrect default permissions in some memory controller configurations
for some Intel(R) Xeon(R) Processors when using Intel(R) Software
Guard Extensions which may allow a privileged user to potentially
enable escalation of privilege via local access.
- INTEL-SA-00767 (CVE-2022-38090):
Improper isolation of shared resources in some Intel(R) Processors
when using Intel(R) Software Guard Extensions may allow a privileged
user to potentially enable information disclosure via local access.
* New Microcodes:
sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
* Updated Microcodes:
sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864
sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888
sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888
sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696
sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960
sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792
sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776
sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800
sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664
sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816
sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480
sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424
sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872
sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
Checksums-Sha1:
cd742010ed9bb7e465aa7e5153cc0e2d2b6f20c0 1798 intel-microcode_3.20230214.1.dsc
aeb541532e21d248cb47d5658eddddec6a45c9af 6550904 intel-microcode_3.20230214.1.tar.xz
367b659f6cf7aa58939be02b4e801c555dc12e18 5793 intel-microcode_3.20230214.1_amd64.buildinfo
Checksums-Sha256:
2048781e8c094582fcc20570142cbbf562f509e16cc50e7b4516eec40b38d8fe 1798 intel-microcode_3.20230214.1.dsc
813b8cff48cad54e5a4f2a475ccf09fbf446b81ed7badfe7e9542cdc242f22c6 6550904 intel-microcode_3.20230214.1.tar.xz
25b8445fc10624ce90116e37d489c3b5e30849da39291c1a4db6eb1d630e6928 5793 intel-microcode_3.20230214.1_amd64.buildinfo
Files:
cae4c808dcac956bcb672fd6cfe7352f 1798 non-free-firmware/admin standard intel-microcode_3.20230214.1.dsc
3ddd417f0531187ec003f51b87fabaa0 6550904 non-free-firmware/admin standard intel-microcode_3.20230214.1.tar.xz
3bd31c74426aad4f4c91e1fda9aa79df 5793 non-free-firmware/admin standard intel-microcode_3.20230214.1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=783i
-----END PGP SIGNATURE-----