Accepted intel-microcode 3.20230214.1~deb11u1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted intel-microcode 3.20230214.1~deb11u1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 25 Mar 2023 14:33:41 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: intel-microcode_3.20230214.1~deb11u1_source.changes
- Debian-source: intel-microcode
- Debian-suite: proposed-updates
- Debian-version: 3.20230214.1~deb11u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=kq15r6Sgu+MwhJyP+nSAwXRcSpHZX8gyDDQhafJ9xuE=; b=GcTO/+EpyW5ul7/Nqt8agBtDd1 Jo0mbAYT3FXzSUIvwDJJqgKD8IRAITBpi3A+LnCdKpccmO8chItq4JtOdM6Pbc+EAC/a1lXDJQxNs 4dqKSKHH3/9XtAiTAR42Uv2fiYb1e+YNfG9VVOrU2YqqUn+2ypeCS4KhrL+olBwmFvncfs1Sz1Tbm Tm6sLhLliv/5WsrnYY9XE9tob/1WyNbyvlvboqtkEghxGGOStUPfb9JYGvCBxwZCPy47ZEv8iKC8G 1MWNv40Sb5NhSM43c0HvVtVjYHltl6yuZjHDIGl6syLDjhfEHr47Pd2NnssmjuJlA28mzJqpyLgzq 2todVqJQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pg4xh-0018p2-1p@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 16 Mar 2023 15:32:02 +0100
Source: intel-microcode
Architecture: source
Version: 3.20230214.1~deb11u1
Distribution: bullseye
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Tobias Frost <tobi@debian.org>
Closes: 1031334
Changes:
intel-microcode (3.20230214.1~deb11u1) bullseye; urgency=medium
.
* Non-maintainer upload.
* Backport package 3.20230214.1 for bullseye.
* New upstream microcode datafile 20230214
- Includes Fixes for: (Closes: #1031334)
- INTEL-SA-00700 (CVE-2022-21216):
Insufficient granularity of access control in out-of-band management
in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a
privileged user to potentially enable escalation of privilege via
adjacent network access.
- INTEL-SA-00730 (CVE-2022-33972):
Incorrect calculation in microcode keying mechanism for some 3rd
Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged
user to potentially enable information disclosure via local acces
- INTEL-SA-00738 (CVE-2022-33196):
Incorrect default permissions in some memory controller configurations
for some Intel(R) Xeon(R) Processors when using Intel(R) Software
Guard Extensions which may allow a privileged user to potentially
enable escalation of privilege via local access.
- INTEL-SA-00767 (CVE-2022-38090):
Improper isolation of shared resources in some Intel(R) Processors
when using Intel(R) Software Guard Extensions may allow a privileged
user to potentially enable information disclosure via local access.
* New Microcodes:
sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
* Updated Microcodes:
sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864
sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888
sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888
sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696
sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960
sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792
sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776
sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800
sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664
sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816
sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480
sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424
sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872
sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
.
intel-microcode (3.20221108.1) unstable; urgency=medium
.
* New upstream microcode datafile 20221108
* New Microcodes:
sig 0x000606c1, pf_mask 0x10, 2022-08-07, rev 0x1000201, size 286720
sig 0x000b0671, pf_mask 0x32, 2022-09-07, rev 0x010e, size 204800
* Updated Microcodes:
sig 0x000706e5, pf_mask 0x80, 2022-08-02, rev 0x00b6, size 113664
sig 0x000806c1, pf_mask 0x80, 2022-06-28, rev 0x00a6, size 110592
sig 0x000806d1, pf_mask 0xc2, 2022-06-28, rev 0x0042, size 102400
sig 0x000806ec, pf_mask 0x94, 2022-07-31, rev 0x00f4, size 105472
sig 0x00090661, pf_mask 0x01, 2022-07-15, rev 0x0017, size 20480
sig 0x00090672, pf_mask 0x07, 2022-09-19, rev 0x0026, size 218112
sig 0x00090675, pf_mask 0x07, 2022-09-19, rev 0x0026
sig 0x000b06f2, pf_mask 0x07, 2022-09-19, rev 0x0026
sig 0x000b06f5, pf_mask 0x07, 2022-09-19, rev 0x0026
sig 0x000906a3, pf_mask 0x80, 2022-09-19, rev 0x0424, size 217088
sig 0x000906a4, pf_mask 0x80, 2022-09-19, rev 0x0424
sig 0x000906ed, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 104448
sig 0x000a0652, pf_mask 0x20, 2022-07-31, rev 0x00f4, size 96256
sig 0x000a0653, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 97280
sig 0x000a0655, pf_mask 0x22, 2022-07-31, rev 0x00f4, size 96256
sig 0x000a0660, pf_mask 0x80, 2022-07-31, rev 0x00f4, size 97280
sig 0x000a0661, pf_mask 0x80, 2022-07-31, rev 0x00f4, size 96256
sig 0x000a0671, pf_mask 0x02, 2022-08-02, rev 0x0056, size 103424
.
intel-microcode (3.20220809.1) unstable; urgency=medium
.
* New upstream microcode datafile 20220809
* Fixes INTEL-SA-00657, CVE-2022-21233
Stale data from APIC leaks SGX memory (AEPIC leak)
* Fixes unspecified errata (functional issues) on Xeon Scalable
* Updated Microcodes:
sig 0x00050653, pf_mask 0x97, 2022-03-14, rev 0x100015e, size 34816
sig 0x00050654, pf_mask 0xb7, 2022-03-08, rev 0x2006e05, size 44032
sig 0x000606a6, pf_mask 0x87, 2022-04-07, rev 0xd000375, size 293888
sig 0x000706a1, pf_mask 0x01, 2022-03-23, rev 0x003c, size 75776
sig 0x000706a8, pf_mask 0x01, 2022-03-23, rev 0x0020, size 75776
sig 0x000706e5, pf_mask 0x80, 2022-03-17, rev 0x00b2, size 112640
sig 0x000806c2, pf_mask 0xc2, 2022-03-19, rev 0x0028, size 97280
sig 0x000806d1, pf_mask 0xc2, 2022-03-28, rev 0x0040, size 102400
sig 0x00090672, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
sig 0x00090675, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
sig 0x000906a3, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064
sig 0x000906a4, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064
sig 0x000a0671, pf_mask 0x02, 2022-03-17, rev 0x0054, size 103424
sig 0x000b06f2, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
sig 0x000b06f5, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
* source: update symlinks to reflect id of the latest release, 20220809
Checksums-Sha1:
d9a6dfb3f1a7408c8735819597e28a3c826016bc 1821 intel-microcode_3.20230214.1~deb11u1.dsc
77733dbc0806bff7fc1fcdb0557f503c56d4c48a 6552400 intel-microcode_3.20230214.1~deb11u1.tar.xz
c70916d880949e839cdb5aa0994a75d63fd99ec9 6085 intel-microcode_3.20230214.1~deb11u1_amd64.buildinfo
Checksums-Sha256:
2f2fef77d44ae0090fd4d5e934a2be9f8e8037f23d1799e0ef7f3ee6a54dee9f 1821 intel-microcode_3.20230214.1~deb11u1.dsc
1b10c7b622063029cc932cfa4115c278412e1dd01e709154e1ac7e200fe48baf 6552400 intel-microcode_3.20230214.1~deb11u1.tar.xz
82a5270accd6c929cfa584192696fd523c72e361b511909d6d435365a6617e65 6085 intel-microcode_3.20230214.1~deb11u1_amd64.buildinfo
Files:
d94cbd1fcafe4da72c6df8803cc04405 1821 non-free/admin standard intel-microcode_3.20230214.1~deb11u1.dsc
c87aaf600056ab4daaed07fc1695ac3f 6552400 non-free/admin standard intel-microcode_3.20230214.1~deb11u1.tar.xz
d4f53439d350e91358bebf3d4c561999 6085 non-free/admin standard intel-microcode_3.20230214.1~deb11u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEE/d0M/zhkJ3YwohhskWT6HRe9XTYFAmQVf90ACgkQkWT6HRe9
XTbH6hAAxRFAESMOdpFAbFYt5y4NnFG2yEF8h7Ra8r2rX4HdVeo3SaP/65UEEHRD
3001wAz403CW6nZZ9tb4+dD8jKtMJhE4as2KRidnzbnxfDlMB7Jziu588QCjrbmk
nDZVLBSR/jQtcNNOEJ/U176bVjuqFxTRH3771xWtbDuGifARZHskfIuxbuFMw833
MyI11OnSDicRZDIOUPw15HjbN1cycy352MYOFi6TYU9NzuskfOj8ItQOHQdESWvK
8fg7Pl8yOvFVyQv/Kz7swqbSoKcg9KiTaDVZ/nAdrn7CwrB2ys8YbxQ5dZre4PaM
IWt2CNZRJfG9w62TMmU5Qy2xKKZ7Qbf4/KqTv+l5eNfZNCh2nhEeHQ9PzVdGFL9Y
JhTyWGVSoAnaWdjdGN0+yEgr0R1QYEK3QoRm7IcSgRIkqWtHn81YM9AKAcMUerTe
WXG932qRbBdr3GsaGBuRx5pZf85/hGk5i2SyhUpP/KW9tXC+M8TXxsgswiCP2AUT
tNRuTmi4Duv75uKH4UrMYnyyE0gYkUPFBZxCcgru2df2+CtPb1SyP1PG6ilkBxzp
W78ykfTbYlPrxllT/6D1km0k0jLcqDx1NOD+htv3ZkAoIhy8/FSfVkcq5oVh0+ta
sCvuPITmWDwUXFKh0cg14S9E8iBJhbGq/9ElU/ONi5wfLVxHo6A=
=AsQg
-----END PGP SIGNATURE-----