Accepted intel-microcode 3.20230808.1~deb12u1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted intel-microcode 3.20230808.1~deb12u1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 12 Aug 2023 11:02:12 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: intel-microcode_3.20230808.1~deb12u1_source.changes
- Debian-source: intel-microcode
- Debian-suite: proposed-updates
- Debian-version: 3.20230808.1~deb12u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=J9Bt9Wc+5V+X7iwTWy7btZKLizhSm9Iu5b0vg/7RFng=; b=PVTwaPOYZ+EeX7bW/FhsRdab0n SOomOTQANo7D/TnDO8GuvRHs0DGCzthlsieomeRU7zMT91aImgwW2cPaYA7UphLcBHAbrg2aee+Dv pQtfG6bYCHeKq2xc2XRgNTH5lJ2Dp2ZB3/blgrp5Ko+8vR1OoEJRbYP5zaIS+CLznaVHwRH63p6Am WFTI++fjVxgV8jeivsAidGijq8AP2y0o2rVA3M9IdxhIZ6R0Whm9VPVFXkx7YlucKLCgJvZt12EfX MYfG+wMBGEvvY0P9eLzJvT7n6qanFowFTn1F7v+E8YEPCfNxkZML4MTwirXzBnR0Ndb4YTn3Fr6Fg yOFqidGg==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1qUmNo-00CyNH-Cw@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 08 Aug 2023 20:08:03 -0300
Source: intel-microcode
Architecture: source
Version: 3.20230808.1~deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 1043305
Changes:
intel-microcode (3.20230808.1~deb12u1) bookworm-security; urgency=high
.
* Build for bookworm (no changes)
.
intel-microcode (3.20230808.1) unstable; urgency=high
.
* New upstream microcode datafile 20230808 (closes: #1043305)
Mitigations for "Downfall" INTEL-SA-00828 (CVE-2022-40982),
INTEL-SA-00836 (CVE-2023-23908) and INTEL-SA-00837 (CVE-2022-41804)
* Updated microcodes:
sig 0x00050653, pf_mask 0x97, 2023-03-23, rev 0x1000181, size 36864
sig 0x00050654, pf_mask 0xb7, 2023-03-06, rev 0x2007006, size 44032
sig 0x00050656, pf_mask 0xbf, 2023-03-17, rev 0x4003604, size 38912
sig 0x00050657, pf_mask 0xbf, 2023-03-17, rev 0x5003604, size 38912
sig 0x0005065b, pf_mask 0xbf, 2023-03-21, rev 0x7002703, size 30720
sig 0x000606a6, pf_mask 0x87, 2023-03-30, rev 0xd0003a5, size 297984
sig 0x000706e5, pf_mask 0x80, 2023-02-26, rev 0x00bc, size 113664
sig 0x000806c1, pf_mask 0x80, 2023-02-27, rev 0x00ac, size 111616
sig 0x000806c2, pf_mask 0xc2, 2023-02-27, rev 0x002c, size 98304
sig 0x000806d1, pf_mask 0xc2, 2023-02-27, rev 0x0046, size 103424
sig 0x000806e9, pf_mask 0xc0, 2023-02-22, rev 0x00f4, size 106496
sig 0x000806e9, pf_mask 0x10, 2023-02-23, rev 0x00f4, size 105472
sig 0x000806ea, pf_mask 0xc0, 2023-02-23, rev 0x00f4, size 105472
sig 0x000806eb, pf_mask 0xd0, 2023-02-23, rev 0x00f4, size 106496
sig 0x000806ec, pf_mask 0x94, 2023-02-26, rev 0x00f8, size 106496
sig 0x000806f8, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
sig 0x000806f7, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
sig 0x000806f6, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
sig 0x000806f5, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
sig 0x000806f4, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
sig 0x000806f8, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184
sig 0x000806f6, pf_mask 0x10, 2023-05-15, rev 0x2c000271
sig 0x000806f5, pf_mask 0x10, 2023-05-15, rev 0x2c000271
sig 0x000806f4, pf_mask 0x10, 2023-05-15, rev 0x2c000271
sig 0x00090672, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160
sig 0x00090675, pf_mask 0x07, 2023-04-18, rev 0x002e
sig 0x000b06f2, pf_mask 0x07, 2023-04-18, rev 0x002e
sig 0x000b06f5, pf_mask 0x07, 2023-04-18, rev 0x002e
sig 0x000906a3, pf_mask 0x80, 2023-04-18, rev 0x042c, size 219136
sig 0x000906a4, pf_mask 0x80, 2023-04-18, rev 0x042c
sig 0x000906e9, pf_mask 0x2a, 2023-02-23, rev 0x00f4, size 108544
sig 0x000906ea, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 104448
sig 0x000906eb, pf_mask 0x02, 2023-02-23, rev 0x00f4, size 106496
sig 0x000906ec, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 105472
sig 0x000906ed, pf_mask 0x22, 2023-02-27, rev 0x00fa, size 106496
sig 0x000a0652, pf_mask 0x20, 2023-02-23, rev 0x00f8, size 97280
sig 0x000a0653, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280
sig 0x000a0655, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280
sig 0x000a0660, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 97280
sig 0x000a0661, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 96256
sig 0x000a0671, pf_mask 0x02, 2023-02-26, rev 0x0059, size 104448
sig 0x000b0671, pf_mask 0x32, 2023-06-06, rev 0x0119, size 210944
sig 0x000b06a2, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064
sig 0x000b06a3, pf_mask 0xe0, 2023-06-06, rev 0x4119
sig 0x000b06e0, pf_mask 0x11, 2023-04-12, rev 0x0011, size 136192
* source: update symlinks to reflect id of the latest release, 20230808
Checksums-Sha1:
493a868347db1dd4f2a71471acd65199f72e03e8 1830 intel-microcode_3.20230808.1~deb12u1.dsc
4bd7d67282fce04178f8722bc75aaf45f73a3d72 7199240 intel-microcode_3.20230808.1~deb12u1.tar.xz
f6e7a7ec6d7d89caa80055754a6e28796cf88377 6049 intel-microcode_3.20230808.1~deb12u1_amd64.buildinfo
Checksums-Sha256:
27384950ada8152f425c6166462950a66d27b871231738f8d3c0c062cd29241d 1830 intel-microcode_3.20230808.1~deb12u1.dsc
b29c3296f94aaf1bfee1d4bc3194e1e8446730f0727613ef1a70d8d1dd51118e 7199240 intel-microcode_3.20230808.1~deb12u1.tar.xz
cc649bf70ea7b8eca43839d88641960a3755284ed65b8bcf3d6fc2515f927d63 6049 intel-microcode_3.20230808.1~deb12u1_amd64.buildinfo
Files:
4904671be6b8135bd8fb5dfd618493d2 1830 non-free-firmware/admin standard intel-microcode_3.20230808.1~deb12u1.dsc
db521a942b0e428b774a3f7c4e0ab500 7199240 non-free-firmware/admin standard intel-microcode_3.20230808.1~deb12u1.tar.xz
ce6d842e1784f5d4c9447b2b151e6377 6049 non-free-firmware/admin standard intel-microcode_3.20230808.1~deb12u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEIXEYtQeAQUHyKjs9TkVcVzAplOQFAmTSzhQACgkQTkVcVzAp
lORwjQ//Qh2bkHQA80AccvgGyBirvktSfEwYXviZeEY3pdBzOM5bwEkmEGFh4CfD
V5cHBarUIS2x6Hf3l5zCtJPuXq1CMZV9Hvklpbr4w8MMIJpbri4YcV4VYZ+ngHIt
fytVAwPWCrTya8EptqCG8PEjv4aRbF+f3AedREAOK2T8QPN6iPJYKnVpYDPDPmjy
UnVJh7brIJ0a64fITC0i69N1kxjJ3bs9oWPItJLSxwdUB0Q2dwr0rvD8fjjCRC6d
EcJG71u2v9MA3910/UQoU/xGJyYkOaSF3g1pd1rQne/7oFGaZcPA4/sXqOWH5jVu
FSC9ZTa4SPWkYUTBTzm7c39jl7IDOT7Sffx6FjO/P+GNn2YSKHmlCpQqpytokDzE
jiYKG8hMlu4F4d9W0+HIHQtXxuX1zUdyBsH26FjVww9mUIsCVIZGXVbCbhTnPgLL
BsKPnvgVKzYxMSMFRnD8TW6Y5Euljqa+Gd3DcgNKLGGUlZatMHcBibmwGjO8K+J7
t2dj/x2plHQk7Ok/W0lRrboOlHhK9oF3/elqPWgGSLjpiUkcjqNEvnfWkdEpzs7S
Eg9pE6l6MshDXK6/jfL1MhMNOpb3WVfZkSDKLVAV+Oq4qMGRniqxtwyNINeBNeZc
E9hKhijRPgv/IEQJOl4UXgede7AQCLotZdo2B4lD9Tcqv9x0Mt4=
=/YZQ
-----END PGP SIGNATURE-----