Bug 56462 - intel-microcode: Multiple issues (5.0)
Summary: intel-microcode: Multiple issues (5.0)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.0
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.0-4-errata
Assignee: Quality Assurance
QA Contact: Philipp Hahn
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-21 11:47 CEST by Quality Assurance
Modified: 2023-08-23 14:54 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 7.5 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L) NVD RedHat


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2023-08-21 11:47:18 CEST
New Debian intel-microcode 3.20230808.1~deb10u1 fixes:
This update addresses the following issues:
3.20230808.1~deb10u1 (Tue, 15 Aug 2023 18:30:59 +0530)
* Non-maintainer upload by the LTS team.
* Backport 3.20230808.1 to buster.
3.20230808.1~deb11u1 (Tue, 08 Aug 2023 20:51:57 -0300)
* Backport to Debian Bullseye
* debian/control: revert non-free-firmware change
3.20230808.1 (Tue, 08 Aug 2023 17:25:56 -0300)
* New upstream microcode datafile 20230808 Mitigations for "Downfall"  INTEL-SA-00828 (CVE-2022-40982), INTEL-SA-00836 (CVE-2023-23908) and  INTEL-SA-00837 (CVE-2022-41804) * Updated microcodes: sig 0x00050653,  pf_mask 0x97, 2023-03-23, rev 0x1000181, size 36864 sig 0x00050654, pf_mask  0xb7, 2023-03-06, rev 0x2007006, size 44032 sig 0x00050656, pf_mask 0xbf,  2023-03-17, rev 0x4003604, size 38912 sig 0x00050657, pf_mask 0xbf,  2023-03-17, rev 0x5003604, size 38912 sig 0x0005065b, pf_mask 0xbf,  2023-03-21, rev 0x7002703, size 30720 sig 0x000606a6, pf_mask 0x87,  2023-03-30, rev 0xd0003a5, size 297984 sig 0x000706e5, pf_mask 0x80,  2023-02-26, rev 0x00bc, size 113664 sig 0x000806c1, pf_mask 0x80,  2023-02-27, rev 0x00ac, size 111616 sig 0x000806c2, pf_mask 0xc2,  2023-02-27, rev 0x002c, size 98304 sig 0x000806d1, pf_mask 0xc2,  2023-02-27, rev 0x0046, size 103424 sig 0x000806e9, pf_mask 0xc0,  2023-02-22, rev 0x00f4, size 106496 sig 0x000806e9, pf_mask 0x10,  2023-02-23, rev 0x00f4, size 105472 sig 0x000806ea, pf_mask 0xc0,  2023-02-23, rev 0x00f4, size 105472 sig 0x000806eb, pf_mask 0xd0,  2023-02-23, rev 0x00f4, size 106496 sig 0x000806ec, pf_mask 0x94,  2023-02-26, rev 0x00f8, size 106496 sig 0x000806f8, pf_mask 0x87,  2023-05-09, rev 0x2b0004b1, size 572416 sig 0x000806f7, pf_mask 0x87,  2023-05-09, rev 0x2b0004b1 sig 0x000806f6, pf_mask 0x87, 2023-05-09, rev  0x2b0004b1 sig 0x000806f5, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 sig  0x000806f4, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 sig 0x000806f8,  pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184 sig 0x000806f6,  pf_mask 0x10, 2023-05-15, rev 0x2c000271 sig 0x000806f5, pf_mask 0x10,  2023-05-15, rev 0x2c000271 sig 0x000806f4, pf_mask 0x10, 2023-05-15, rev  0x2c000271 sig 0x00090672, pf_mask 0x07, 2023-04-18, rev 0x002e, size  220160 sig 0x00090675, pf_mask 0x07, 2023-04-18, rev 0x002e sig 0x000b06f2,  pf_mask 0x07, 2023-04-18, rev 0x002e sig 0x000b06f5, pf_mask 0x07,  2023-04-18, rev 0x002e sig 0x000906a3, pf_mask 0x80, 2023-04-18, rev  0x042c, size 219136 sig 0x000906a4, pf_mask 0x80, 2023-04-18, rev 0x042c  sig 0x000906e9, pf_mask 0x2a, 2023-02-23, rev 0x00f4, size 108544 sig  0x000906ea, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 104448 sig  0x000906eb, pf_mask 0x02, 2023-02-23, rev 0x00f4, size 106496 sig  0x000906ec, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 105472 sig  0x000906ed, pf_mask 0x22, 2023-02-27, rev 0x00fa, size 106496 sig  0x000a0652, pf_mask 0x20, 2023-02-23, rev 0x00f8, size 97280 sig  0x000a0653, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280 sig  0x000a0655, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280 sig  0x000a0660, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 97280 sig  0x000a0661, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 96256 sig  0x000a0671, pf_mask 0x02, 2023-02-26, rev 0x0059, size 104448 sig  0x000b0671, pf_mask 0x32, 2023-06-06, rev 0x0119, size 210944 sig  0x000b06a2, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064 sig  0x000b06a3, pf_mask 0xe0, 2023-06-06, rev 0x4119 sig 0x000b06e0, pf_mask  0x11, 2023-04-12, rev 0x0011, size 136192
* source: update symlinks to reflect id of the latest release, 20230808
3.20230512.1 (Tue, 16 May 2023 00:13:02 -0300)
* New upstream microcode datafile 20230512 * New microcodes: sig 0x000906a4,  pf_mask 0x40, 2022-10-12, rev 0x0004, size 115712 sig 0x000b06e0, pf_mask  0x01, 2022-12-19, rev 0x0010, size 134144 * Updated microcodes: sig  0x00050653, pf_mask 0x97, 2022-12-21, rev 0x1000171, size 36864 sig  0x00050654, pf_mask 0xb7, 2022-12-21, rev 0x2006f05, size 44032 sig  0x00050656, pf_mask 0xbf, 2022-12-21, rev 0x4003501, size 37888 sig  0x00050657, pf_mask 0xbf, 2022-12-21, rev 0x5003501, size 37888 sig  0x0005065b, pf_mask 0xbf, 2022-12-21, rev 0x7002601, size 29696 sig  0x000606a6, pf_mask 0x87, 2022-12-28, rev 0xd000390, size 296960 sig  0x000706e5, pf_mask 0x80, 2022-12-25, rev 0x00ba, size 113664 sig  0x000806a1, pf_mask 0x10, 2023-01-13, rev 0x0033, size 34816 sig  0x000806c1, pf_mask 0x80, 2022-12-28, rev 0x00aa, size 110592 sig  0x000806c2, pf_mask 0xc2, 2022-12-28, rev 0x002a, size 97280 sig  0x000806d1, pf_mask 0xc2, 2022-12-28, rev 0x0044, size 102400 sig  0x000806e9, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472 sig  0x000806e9, pf_mask 0x10, 2023-01-02, rev 0x00f2, size 105472 sig  0x000806ea, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472 sig  0x000806eb, pf_mask 0xd0, 2022-12-26, rev 0x00f2, size 105472 sig  0x000806ec, pf_mask 0x94, 2022-12-26, rev 0x00f6, size 105472 sig  0x000806f8, pf_mask 0x87, 2023-03-13, rev 0x2b000461, size 564224 sig  0x000806f7, pf_mask 0x87, 2023-03-13, rev 0x2b000461 sig 0x000806f6,  pf_mask 0x87, 2023-03-13, rev 0x2b000461 sig 0x000806f5, pf_mask 0x87,  2023-03-13, rev 0x2b000461 sig 0x000806f4, pf_mask 0x87, 2023-03-13, rev  0x2b000461 sig 0x000806f8, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1, size  595968 sig 0x000806f6, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 sig  0x000806f5, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 sig 0x000806f4,  pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 sig 0x000906a3, pf_mask 0x80,  2023-02-14, rev 0x042a, size 218112 sig 0x000906a4, pf_mask 0x80,  2023-02-14, rev 0x042a sig 0x000906e9, pf_mask 0x2a, 2022-12-26, rev  0x00f2, size 108544 sig 0x000906ea, pf_mask 0x22, 2023-01-12, rev 0x00f2,  size 104448 sig 0x000906eb, pf_mask 0x02, 2022-12-26, rev 0x00f2, size  105472 sig 0x000906ec, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448  sig 0x000906ed, pf_mask 0x22, 2023-02-05, rev 0x00f8, size 104448 sig  0x000a0652, pf_mask 0x20, 2022-12-27, rev 0x00f6, size 96256 sig  0x000a0653, pf_mask 0x22, 2023-01-01, rev 0x00f6, size 97280 sig  0x000a0655, pf_mask 0x22, 2022-12-26, rev 0x00f6, size 96256 sig  0x000a0660, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 97280 sig  0x000a0661, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 96256 sig  0x000a0671, pf_mask 0x02, 2022-12-25, rev 0x0058, size 103424 sig  0x000b0671, pf_mask 0x32, 2023-02-06, rev 0x0113, size 207872 sig  0x000b06a2, pf_mask 0xc0, 2023-02-22, rev 0x4112, size 212992 sig  0x000b06a3, pf_mask 0xc0, 2023-02-22, rev 0x4112
* source: update symlinks to reflect id of the latest release, 20230512
3.20230214.1~deb11u1 (Thu, 16 Mar 2023 15:32:02 +0100)
* Non-maintainer upload.
* Backport package 3.20230214.1 for bullseye.
* New upstream microcode datafile 20230214 - Includes Fixes for: -  INTEL-SA-00700 (CVE-2022-21216): Insufficient granularity of access control  in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable  Processors may allow a privileged user to potentially enable escalation of  privilege via adjacent network access. - INTEL-SA-00730 (CVE-2022-33972):  Incorrect calculation in microcode keying mechanism for some 3rd Generation  Intel(R) Xeon(R) Scalable Processors may allow a privileged user to  potentially enable information disclosure via local acces - INTEL-SA-00738  (CVE-2022-33196): Incorrect default permissions in some memory controller  configurations for some Intel(R) Xeon(R) Processors when using Intel(R)  Software Guard Extensions which may allow a privileged user to potentially  enable escalation of privilege via local access. - INTEL-SA-00767  (CVE-2022-38090): Improper isolation of shared resources in some Intel(R)  Processors when using Intel(R) Software Guard Extensions may allow a  privileged user to potentially enable information disclosure via local  access.
* New Microcodes: sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170,  size 600064 sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size  561152 sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size  600064 sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size  561152 sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size  600064 sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size  561152 sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size  561152 sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size  600064 sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size  561152 sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992  sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
* Updated Microcodes: sig 0x00050653, pf_mask 0x97, 2022-08-30, rev  0x1000161, size 36864 sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev  0x4003303, size 37888 sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev  0x5003303, size 37888 sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev  0x7002503, size 29696 sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev  0xd000389, size 296960 sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev  0x1000211, size 289792 sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev  0x003e, size 75776 sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022,  size 76800 sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size  113664 sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 sig  0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig  0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig  0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 sig  0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 sig  0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480 sig  0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424 sig  0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872 sig  0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig  0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
3.20230214.1 (Sun, 12 Mar 2023 18:16:50 +0100)
* New upstream microcode datafile 20230214 - Includes Fixes for: -  INTEL-SA-00700: CVE-2022-21216 - INTEL-SA-00730: CVE-2022-33972 -  INTEL-SA-00738: CVE-2022-33196 - INTEL-SA-00767: CVE-2022-38090
* New Microcodes: sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170  sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f5,  pf_mask 0x10, 2022-12-19, rev 0x2c000170 sig 0x000806f5, pf_mask 0x87,  2022-12-27, rev 0x2b000181 sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev  0x2c000170 sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig  0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f8,  pf_mask 0x10, 2022-12-19, rev 0x2c000170 sig 0x000806f8, pf_mask 0x10,  2022-12-19, rev 0x2c000170, size 600064 sig 0x000806f8, pf_mask 0x87,  2022-12-27, rev 0x2b000181 sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev  0x2b000181, size 561152 sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev  0x410e sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992  sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e
* Updated Microcodes: sig 0x00050653, pf_mask 0x97, 2022-08-30, rev  0x1000161, size 36864 sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev  0x4003303, size 37888 sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev  0x5003303, size 37888 sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev  0x7002503, size 29696 sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev  0xd000389, size 296960 sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev  0x1000211, size 289792 sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev  0x003e, size 75776 sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022,  size 76800 sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size  113664 sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 sig  0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c sig 0x00090672, pf_mask  0x07, 2023-01-04, rev 0x002c, size 219136 sig 0x00090675, pf_mask 0x07,  2023-01-04, rev 0x002c sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429  sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 sig  0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429 sig 0x000906c0, pf_mask  0x01, 2022-09-02, rev 0x24000024, size 20480 sig 0x000a0671, pf_mask 0x02,  2022-08-31, rev 0x0057, size 103424 sig 0x000b0671, pf_mask 0x32,  2022-12-19, rev 0x0112, size 207872 sig 0x000b06f2, pf_mask 0x07,  2023-01-04, rev 0x002c sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c
Comment 1 Quality Assurance univentionstaff 2023-08-22 12:00:18 CEST
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20230214.1~deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-4/source/intel-microcode_3.20230808.1~deb10u1.dsc
@@ -1,3 +1,225 @@
+3.20230808.1~deb10u1 [Tue, 15 Aug 2023 18:30:59 +0530] Utkarsh Gupta <utkarsh@debian.org>:
+
+  * Non-maintainer upload by the LTS team.
+  * Backport 3.20230808.1 to buster.
+
+3.20230808.1~deb11u1 [Tue, 08 Aug 2023 20:51:57 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * Backport to Debian Bullseye
+  * debian/control: revert non-free-firmware change
+
+3.20230808.1 [Tue, 08 Aug 2023 17:25:56 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20230808 (closes: #1043305)
+    Mitigations for "Downfall" INTEL-SA-00828 (CVE-2022-40982),
+    INTEL-SA-00836 (CVE-2023-23908) and INTEL-SA-00837 (CVE-2022-41804)
+    * Updated microcodes:
+      sig 0x00050653, pf_mask 0x97, 2023-03-23, rev 0x1000181, size 36864
+      sig 0x00050654, pf_mask 0xb7, 2023-03-06, rev 0x2007006, size 44032
+      sig 0x00050656, pf_mask 0xbf, 2023-03-17, rev 0x4003604, size 38912
+      sig 0x00050657, pf_mask 0xbf, 2023-03-17, rev 0x5003604, size 38912
+      sig 0x0005065b, pf_mask 0xbf, 2023-03-21, rev 0x7002703, size 30720
+      sig 0x000606a6, pf_mask 0x87, 2023-03-30, rev 0xd0003a5, size 297984
+      sig 0x000706e5, pf_mask 0x80, 2023-02-26, rev 0x00bc, size 113664
+      sig 0x000806c1, pf_mask 0x80, 2023-02-27, rev 0x00ac, size 111616
+      sig 0x000806c2, pf_mask 0xc2, 2023-02-27, rev 0x002c, size 98304
+      sig 0x000806d1, pf_mask 0xc2, 2023-02-27, rev 0x0046, size 103424
+      sig 0x000806e9, pf_mask 0xc0, 2023-02-22, rev 0x00f4, size 106496
+      sig 0x000806e9, pf_mask 0x10, 2023-02-23, rev 0x00f4, size 105472
+      sig 0x000806ea, pf_mask 0xc0, 2023-02-23, rev 0x00f4, size 105472
+      sig 0x000806eb, pf_mask 0xd0, 2023-02-23, rev 0x00f4, size 106496
+      sig 0x000806ec, pf_mask 0x94, 2023-02-26, rev 0x00f8, size 106496
+      sig 0x000806f8, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
+      sig 0x000806f7, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
+      sig 0x000806f6, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
+      sig 0x000806f5, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
+      sig 0x000806f4, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1
+      sig 0x000806f8, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184
+      sig 0x000806f6, pf_mask 0x10, 2023-05-15, rev 0x2c000271
+      sig 0x000806f5, pf_mask 0x10, 2023-05-15, rev 0x2c000271
+      sig 0x000806f4, pf_mask 0x10, 2023-05-15, rev 0x2c000271
+      sig 0x00090672, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160
+      sig 0x00090675, pf_mask 0x07, 2023-04-18, rev 0x002e
+      sig 0x000b06f2, pf_mask 0x07, 2023-04-18, rev 0x002e
+      sig 0x000b06f5, pf_mask 0x07, 2023-04-18, rev 0x002e
+      sig 0x000906a3, pf_mask 0x80, 2023-04-18, rev 0x042c, size 219136
+      sig 0x000906a4, pf_mask 0x80, 2023-04-18, rev 0x042c
+      sig 0x000906e9, pf_mask 0x2a, 2023-02-23, rev 0x00f4, size 108544
+      sig 0x000906ea, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 104448
+      sig 0x000906eb, pf_mask 0x02, 2023-02-23, rev 0x00f4, size 106496
+      sig 0x000906ec, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 105472
+      sig 0x000906ed, pf_mask 0x22, 2023-02-27, rev 0x00fa, size 106496
+      sig 0x000a0652, pf_mask 0x20, 2023-02-23, rev 0x00f8, size 97280
+      sig 0x000a0653, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280
+      sig 0x000a0655, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280
+      sig 0x000a0660, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 97280
+      sig 0x000a0661, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 96256
+      sig 0x000a0671, pf_mask 0x02, 2023-02-26, rev 0x0059, size 104448
+      sig 0x000b0671, pf_mask 0x32, 2023-06-06, rev 0x0119, size 210944
+      sig 0x000b06a2, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064
+      sig 0x000b06a3, pf_mask 0xe0, 2023-06-06, rev 0x4119
+      sig 0x000b06e0, pf_mask 0x11, 2023-04-12, rev 0x0011, size 136192
+  * source: update symlinks to reflect id of the latest release, 20230808
+
+3.20230512.1 [Tue, 16 May 2023 00:13:02 -0300] Henrique de Moraes Holschuh <hmh@debian.org>:
+
+  * New upstream microcode datafile 20230512 (closes: #1036013)
+    * New microcodes:
+      sig 0x000906a4, pf_mask 0x40, 2022-10-12, rev 0x0004, size 115712
+      sig 0x000b06e0, pf_mask 0x01, 2022-12-19, rev 0x0010, size 134144
+    * Updated microcodes:
+      sig 0x00050653, pf_mask 0x97, 2022-12-21, rev 0x1000171, size 36864
+      sig 0x00050654, pf_mask 0xb7, 2022-12-21, rev 0x2006f05, size 44032
+      sig 0x00050656, pf_mask 0xbf, 2022-12-21, rev 0x4003501, size 37888
+      sig 0x00050657, pf_mask 0xbf, 2022-12-21, rev 0x5003501, size 37888
+      sig 0x0005065b, pf_mask 0xbf, 2022-12-21, rev 0x7002601, size 29696
+      sig 0x000606a6, pf_mask 0x87, 2022-12-28, rev 0xd000390, size 296960
+      sig 0x000706e5, pf_mask 0x80, 2022-12-25, rev 0x00ba, size 113664
+      sig 0x000806a1, pf_mask 0x10, 2023-01-13, rev 0x0033, size 34816
+      sig 0x000806c1, pf_mask 0x80, 2022-12-28, rev 0x00aa, size 110592
+      sig 0x000806c2, pf_mask 0xc2, 2022-12-28, rev 0x002a, size 97280
+      sig 0x000806d1, pf_mask 0xc2, 2022-12-28, rev 0x0044, size 102400
+      sig 0x000806e9, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472
+      sig 0x000806e9, pf_mask 0x10, 2023-01-02, rev 0x00f2, size 105472
+      sig 0x000806ea, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472
+      sig 0x000806eb, pf_mask 0xd0, 2022-12-26, rev 0x00f2, size 105472
+      sig 0x000806ec, pf_mask 0x94, 2022-12-26, rev 0x00f6, size 105472
+      sig 0x000806f8, pf_mask 0x87, 2023-03-13, rev 0x2b000461, size 564224
+      sig 0x000806f7, pf_mask 0x87, 2023-03-13, rev 0x2b000461
+      sig 0x000806f6, pf_mask 0x87, 2023-03-13, rev 0x2b000461
+      sig 0x000806f5, pf_mask 0x87, 2023-03-13, rev 0x2b000461
+      sig 0x000806f4, pf_mask 0x87, 2023-03-13, rev 0x2b000461
+      sig 0x000806f8, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1, size 595968
+      sig 0x000806f6, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1
+      sig 0x000806f5, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1
+      sig 0x000806f4, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1
+      sig 0x000906a3, pf_mask 0x80, 2023-02-14, rev 0x042a, size 218112
+      sig 0x000906a4, pf_mask 0x80, 2023-02-14, rev 0x042a
+      sig 0x000906e9, pf_mask 0x2a, 2022-12-26, rev 0x00f2, size 108544
+      sig 0x000906ea, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448
+      sig 0x000906eb, pf_mask 0x02, 2022-12-26, rev 0x00f2, size 105472
+      sig 0x000906ec, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448
+      sig 0x000906ed, pf_mask 0x22, 2023-02-05, rev 0x00f8, size 104448
+      sig 0x000a0652, pf_mask 0x20, 2022-12-27, rev 0x00f6, size 96256
+      sig 0x000a0653, pf_mask 0x22, 2023-01-01, rev 0x00f6, size 97280
+      sig 0x000a0655, pf_mask 0x22, 2022-12-26, rev 0x00f6, size 96256
+      sig 0x000a0660, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 97280
+      sig 0x000a0661, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 96256
+      sig 0x000a0671, pf_mask 0x02, 2022-12-25, rev 0x0058, size 103424
+      sig 0x000b0671, pf_mask 0x32, 2023-02-06, rev 0x0113, size 207872
+      sig 0x000b06a2, pf_mask 0xc0, 2023-02-22, rev 0x4112, size 212992
+      sig 0x000b06a3, pf_mask 0xc0, 2023-02-22, rev 0x4112
+  * source: update symlinks to reflect id of the latest release, 20230512
+
+3.20230214.1~deb11u1 [Thu, 16 Mar 2023 15:32:02 +0100] Tobias Frost <tobi@debian.org>:
+
+  * Non-maintainer upload.
+  * Backport package 3.20230214.1 for bullseye.
+  * New upstream microcode datafile 20230214
+    - Includes Fixes for: (Closes: #1031334)
+       - INTEL-SA-00700 (CVE-2022-21216):
+         Insufficient granularity of access control in out-of-band management
+         in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a
+         privileged user to potentially enable escalation of privilege via
+         adjacent network access.
+       - INTEL-SA-00730 (CVE-2022-33972):
+         Incorrect calculation in microcode keying mechanism for some 3rd
+         Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged
+         user to potentially enable information disclosure via local acces
+       - INTEL-SA-00738 (CVE-2022-33196):
+         Incorrect default permissions in some memory controller configurations
+         for some Intel(R) Xeon(R) Processors when using Intel(R) Software
+         Guard Extensions which may allow a privileged user to potentially
+         enable escalation of privilege via local access.
+       - INTEL-SA-00767 (CVE-2022-38090):
+         Improper isolation of shared resources in some Intel(R) Processors
+         when using Intel(R) Software Guard Extensions may allow a privileged
+         user to potentially enable information disclosure via local access.
+  * New Microcodes:
+    sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
+    sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
+  * Updated Microcodes:
+    sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864
+    sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888
+    sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888
+    sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696
+    sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960
+    sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792
+    sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776
+    sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800
+    sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664
+    sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816
+    sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
+    sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
+    sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480
+    sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424
+    sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872
+    sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+
+3.20230214.1 [Sun, 12 Mar 2023 18:16:50 +0100] Tobias Frost <tobi@debian.org>:
+
+  * Non-maintainer upload.
+  * New upstream microcode datafile 20230214
+    - Includes Fixes for: (Closes: #1031334)
+       - INTEL-SA-00700: CVE-2022-21216
+       - INTEL-SA-00730: CVE-2022-33972
+       - INTEL-SA-00738: CVE-2022-33196
+       - INTEL-SA-00767: CVE-2022-38090
+  * New Microcodes:
+    sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+    sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+    sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+    sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+    sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+    sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+    sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+    sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+    sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+    sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+    sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+    sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e
+    sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
+    sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e
+  * Updated Microcodes:
+    sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864
+    sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888
+    sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888
+    sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696
+    sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960
+    sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792
+    sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776
+    sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800
+    sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664
+    sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816
+    sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c
+    sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+    sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c
+    sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429
+    sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
+    sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429
+    sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480
+    sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424
+    sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872
+    sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c
+    sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c
+
+3.20221108.2 [Fri, 17 Feb 2023 01:12:52 +0100] Cyril Brulebois <kibi@debian.org>:
+
+  * Move source and binary from non-free/admin to non-free-firmware/admin
+    following the 2022 General Resolution about non-free firmware.
+
 3.20230214.1~deb10u1 [Sat, 01 Apr 2023 10:37:09 +0200] Tobias Frost <tobi@debian.org>:
 
   * Non-maintainer upload by the LTS Security Team.

<http://piuparts.knut.univention.de/5.0-4/#6640949708475611571>
Comment 2 Philipp Hahn univentionstaff 2023-08-22 13:18:44 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-4] 9a8c4d8d7a Bug #56462: intel-microcode 3.20230808.1~deb10u1
 doc/errata/staging/intel-microcode.yaml | 184 +-------------------------------
 1 file changed, 1 insertion(+), 183 deletions(-)

[5.0-4] f417d88876 Bug #56462: intel-microcode 3.20230808.1~deb10u1
 doc/errata/staging/intel-microcode.yaml | 198 ++++++++++++++++++++++++++++++++
 1 file changed, 198 insertions(+)