Accepted intel-microcode 3.20231114.1~deb12u1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted intel-microcode 3.20231114.1~deb12u1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 24 Nov 2023 14:32:09 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: intel-microcode_3.20231114.1~deb12u1_source.changes
- Debian-source: intel-microcode
- Debian-suite: proposed-updates
- Debian-version: 3.20231114.1~deb12u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=7qng5qEV7HKyddvvemyyFijngIODuVysYmUlNeAjrPQ=; b=IsEWW80SoKk2EA84IKS8SF6s5w 066Nt8feunSZs6egoDbzfiYMiZgSC6BU7lL9XBANlSiUHaSVJ9i8HPpkRi/wME2OYJ8zN/oWAfTTx XqqwaGduPyCovTJ9SuIK+BKwvi8HsPf+EfeLt0Jyolaj3hfsTbSNY2zmJKWUzpGIYtOpispVh46UK 2yHIpwGTGoisvW8yejRoFmdHd56S+T2hFfeE28trW90UDzvwCJBBK2G+yzrJ0nmQcyKcmzu8EwzWS KMFSNtGd5tPlIhWZ2ZJFfs+ANcQVwhPpu4hL8GwqhoClMboyYd+AG+Dx8yLe66GfD5AF7j3k8Qftz i5MuhGzA==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1r6XE1-00C7hV-Mt@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 18 Nov 2023 16:13:39 -0300
Source: intel-microcode
Architecture: source
Version: 3.20231114.1~deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 1055962
Changes:
intel-microcode (3.20231114.1~deb12u1) bookworm-security; urgency=high
.
* Build for bookworm (no changes)
.
intel-microcode (3.20231114.1) unstable; urgency=medium
.
* New upstream microcode datafile 20231114 (closes: #1055962)
Mitigations for "reptar", INTEL-SA-00950 (CVE-2023-23583)
Sequence of processor instructions leads to unexpected behavior for some
Intel(R) Processors, may allow an authenticated user to potentially enable
escalation of privilege and/or information disclosure and/or denial of
service via local access.
Note: "reptar" on 4th gen Xeon Scalable (sig 0x806f8 pfm 0x87), 12th gen
Core mobile (sig 0x906a4 pfm 0x80), 13th gen Core desktop (sig 0xb0671 pfm
0x01) were already mitigated by a previous microcode update.
* Fixes for unspecified functional issues
* Updated microcodes:
sig 0x000606a6, pf_mask 0x87, 2023-09-01, rev 0xd0003b9, size 299008
sig 0x000606c1, pf_mask 0x10, 2023-09-08, rev 0x1000268, size 290816
sig 0x000706e5, pf_mask 0x80, 2023-09-03, rev 0x00c2, size 113664
sig 0x000806c1, pf_mask 0x80, 2023-09-07, rev 0x00b4, size 111616
sig 0x000806c2, pf_mask 0xc2, 2023-09-07, rev 0x0034, size 98304
sig 0x000806d1, pf_mask 0xc2, 2023-09-07, rev 0x004e, size 104448
sig 0x000806f8, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
sig 0x000806f8, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0
sig 0x000806f7, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0
sig 0x000806f6, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0
sig 0x000806f5, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0
sig 0x000806f4, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0
sig 0x000806f8, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
sig 0x000806f8, pf_mask 0x10, 2023-06-26, rev 0x2c000290
sig 0x000806f6, pf_mask 0x10, 2023-06-26, rev 0x2c000290
sig 0x000806f5, pf_mask 0x10, 2023-06-26, rev 0x2c000290
sig 0x000806f4, pf_mask 0x10, 2023-06-26, rev 0x2c000290
sig 0x00090672, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
sig 0x00090672, pf_mask 0x07, 2023-06-07, rev 0x0032
sig 0x00090675, pf_mask 0x07, 2023-06-07, rev 0x0032
sig 0x000b06f2, pf_mask 0x07, 2023-06-07, rev 0x0032
sig 0x000b06f5, pf_mask 0x07, 2023-06-07, rev 0x0032
sig 0x000906a3, pf_mask 0x80, 2023-06-07, rev 0x0430, size 220160
sig 0x000906a3, pf_mask 0x80, 2023-06-07, rev 0x0430
sig 0x000906a4, pf_mask 0x80, 2023-06-07, rev 0x0430
sig 0x000906a4, pf_mask 0x40, 2023-05-05, rev 0x0005, size 117760
sig 0x000a0671, pf_mask 0x02, 2023-09-03, rev 0x005d, size 104448
sig 0x000b0671, pf_mask 0x32, 2023-08-29, rev 0x011d, size 210944
sig 0x000b06a2, pf_mask 0xe0, 2023-08-30, rev 0x411c, size 216064
sig 0x000b06a2, pf_mask 0xe0, 2023-08-30, rev 0x411c
sig 0x000b06a3, pf_mask 0xe0, 2023-08-30, rev 0x411c
sig 0x000b06e0, pf_mask 0x11, 2023-06-26, rev 0x0012, size 136192
* Updated 2023-08-08 changelog entry with reptar information
* source: update symlinks to reflect id of the latest release, 20231114
Checksums-Sha1:
6e99c9e4db98cf4b939267e56066b17d66371fd1 1830 intel-microcode_3.20231114.1~deb12u1.dsc
cf4747bfbb78c8ba2f80ccb5594b0f37911e1fa5 6776840 intel-microcode_3.20231114.1~deb12u1.tar.xz
9f50ea9e040a37ab20d10e9f509266b08371f150 6130 intel-microcode_3.20231114.1~deb12u1_amd64.buildinfo
Checksums-Sha256:
70297531aed34078c403327eb9fd18b0afa1a6503c36a57a3599fb9b6ac0b99e 1830 intel-microcode_3.20231114.1~deb12u1.dsc
606fdc88a3e15034121730e86d84e55cec98b5cfb747d31af277a0eeaa9c202d 6776840 intel-microcode_3.20231114.1~deb12u1.tar.xz
ef16fdd8df042582704b123fab960304978f47f4e7cb3f1caa7299ef838c032b 6130 intel-microcode_3.20231114.1~deb12u1_amd64.buildinfo
Files:
2ef535e1f487305bc353adcf523a0e17 1830 non-free-firmware/admin standard intel-microcode_3.20231114.1~deb12u1.dsc
8dc8466131323dc0aadfcd5cb18d77b1 6776840 non-free-firmware/admin standard intel-microcode_3.20231114.1~deb12u1.tar.xz
925867af9eec5fbba696fbafe0f0a390 6130 non-free-firmware/admin standard intel-microcode_3.20231114.1~deb12u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=gUkI
-----END PGP SIGNATURE-----