New Debian intel-microcode 3.20230808.1~deb10u1 fixes: This update addresses the following issues: 3.20230808.1~deb10u1 (Tue, 15 Aug 2023 18:30:59 +0530) * Non-maintainer upload by the LTS team. * Backport 3.20230808.1 to buster. 3.20230808.1~deb11u1 (Tue, 08 Aug 2023 20:51:57 -0300) * Backport to Debian Bullseye * debian/control: revert non-free-firmware change 3.20230808.1 (Tue, 08 Aug 2023 17:25:56 -0300) * New upstream microcode datafile 20230808 Mitigations for "Downfall" INTEL-SA-00828 (CVE-2022-40982), INTEL-SA-00836 (CVE-2023-23908) and INTEL-SA-00837 (CVE-2022-41804) * Updated microcodes: sig 0x00050653, pf_mask 0x97, 2023-03-23, rev 0x1000181, size 36864 sig 0x00050654, pf_mask 0xb7, 2023-03-06, rev 0x2007006, size 44032 sig 0x00050656, pf_mask 0xbf, 2023-03-17, rev 0x4003604, size 38912 sig 0x00050657, pf_mask 0xbf, 2023-03-17, rev 0x5003604, size 38912 sig 0x0005065b, pf_mask 0xbf, 2023-03-21, rev 0x7002703, size 30720 sig 0x000606a6, pf_mask 0x87, 2023-03-30, rev 0xd0003a5, size 297984 sig 0x000706e5, pf_mask 0x80, 2023-02-26, rev 0x00bc, size 113664 sig 0x000806c1, pf_mask 0x80, 2023-02-27, rev 0x00ac, size 111616 sig 0x000806c2, pf_mask 0xc2, 2023-02-27, rev 0x002c, size 98304 sig 0x000806d1, pf_mask 0xc2, 2023-02-27, rev 0x0046, size 103424 sig 0x000806e9, pf_mask 0xc0, 2023-02-22, rev 0x00f4, size 106496 sig 0x000806e9, pf_mask 0x10, 2023-02-23, rev 0x00f4, size 105472 sig 0x000806ea, pf_mask 0xc0, 2023-02-23, rev 0x00f4, size 105472 sig 0x000806eb, pf_mask 0xd0, 2023-02-23, rev 0x00f4, size 106496 sig 0x000806ec, pf_mask 0x94, 2023-02-26, rev 0x00f8, size 106496 sig 0x000806f8, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416 sig 0x000806f7, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 sig 0x000806f6, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 sig 0x000806f5, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 sig 0x000806f4, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 sig 0x000806f8, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184 sig 0x000806f6, pf_mask 0x10, 2023-05-15, rev 0x2c000271 sig 0x000806f5, pf_mask 0x10, 2023-05-15, rev 0x2c000271 sig 0x000806f4, pf_mask 0x10, 2023-05-15, rev 0x2c000271 sig 0x00090672, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160 sig 0x00090675, pf_mask 0x07, 2023-04-18, rev 0x002e sig 0x000b06f2, pf_mask 0x07, 2023-04-18, rev 0x002e sig 0x000b06f5, pf_mask 0x07, 2023-04-18, rev 0x002e sig 0x000906a3, pf_mask 0x80, 2023-04-18, rev 0x042c, size 219136 sig 0x000906a4, pf_mask 0x80, 2023-04-18, rev 0x042c sig 0x000906e9, pf_mask 0x2a, 2023-02-23, rev 0x00f4, size 108544 sig 0x000906ea, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 104448 sig 0x000906eb, pf_mask 0x02, 2023-02-23, rev 0x00f4, size 106496 sig 0x000906ec, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 105472 sig 0x000906ed, pf_mask 0x22, 2023-02-27, rev 0x00fa, size 106496 sig 0x000a0652, pf_mask 0x20, 2023-02-23, rev 0x00f8, size 97280 sig 0x000a0653, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280 sig 0x000a0655, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280 sig 0x000a0660, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 97280 sig 0x000a0661, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 96256 sig 0x000a0671, pf_mask 0x02, 2023-02-26, rev 0x0059, size 104448 sig 0x000b0671, pf_mask 0x32, 2023-06-06, rev 0x0119, size 210944 sig 0x000b06a2, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064 sig 0x000b06a3, pf_mask 0xe0, 2023-06-06, rev 0x4119 sig 0x000b06e0, pf_mask 0x11, 2023-04-12, rev 0x0011, size 136192 * source: update symlinks to reflect id of the latest release, 20230808 3.20230512.1 (Tue, 16 May 2023 00:13:02 -0300) * New upstream microcode datafile 20230512 * New microcodes: sig 0x000906a4, pf_mask 0x40, 2022-10-12, rev 0x0004, size 115712 sig 0x000b06e0, pf_mask 0x01, 2022-12-19, rev 0x0010, size 134144 * Updated microcodes: sig 0x00050653, pf_mask 0x97, 2022-12-21, rev 0x1000171, size 36864 sig 0x00050654, pf_mask 0xb7, 2022-12-21, rev 0x2006f05, size 44032 sig 0x00050656, pf_mask 0xbf, 2022-12-21, rev 0x4003501, size 37888 sig 0x00050657, pf_mask 0xbf, 2022-12-21, rev 0x5003501, size 37888 sig 0x0005065b, pf_mask 0xbf, 2022-12-21, rev 0x7002601, size 29696 sig 0x000606a6, pf_mask 0x87, 2022-12-28, rev 0xd000390, size 296960 sig 0x000706e5, pf_mask 0x80, 2022-12-25, rev 0x00ba, size 113664 sig 0x000806a1, pf_mask 0x10, 2023-01-13, rev 0x0033, size 34816 sig 0x000806c1, pf_mask 0x80, 2022-12-28, rev 0x00aa, size 110592 sig 0x000806c2, pf_mask 0xc2, 2022-12-28, rev 0x002a, size 97280 sig 0x000806d1, pf_mask 0xc2, 2022-12-28, rev 0x0044, size 102400 sig 0x000806e9, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472 sig 0x000806e9, pf_mask 0x10, 2023-01-02, rev 0x00f2, size 105472 sig 0x000806ea, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472 sig 0x000806eb, pf_mask 0xd0, 2022-12-26, rev 0x00f2, size 105472 sig 0x000806ec, pf_mask 0x94, 2022-12-26, rev 0x00f6, size 105472 sig 0x000806f8, pf_mask 0x87, 2023-03-13, rev 0x2b000461, size 564224 sig 0x000806f7, pf_mask 0x87, 2023-03-13, rev 0x2b000461 sig 0x000806f6, pf_mask 0x87, 2023-03-13, rev 0x2b000461 sig 0x000806f5, pf_mask 0x87, 2023-03-13, rev 0x2b000461 sig 0x000806f4, pf_mask 0x87, 2023-03-13, rev 0x2b000461 sig 0x000806f8, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1, size 595968 sig 0x000806f6, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 sig 0x000806f5, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 sig 0x000806f4, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 sig 0x000906a3, pf_mask 0x80, 2023-02-14, rev 0x042a, size 218112 sig 0x000906a4, pf_mask 0x80, 2023-02-14, rev 0x042a sig 0x000906e9, pf_mask 0x2a, 2022-12-26, rev 0x00f2, size 108544 sig 0x000906ea, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448 sig 0x000906eb, pf_mask 0x02, 2022-12-26, rev 0x00f2, size 105472 sig 0x000906ec, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448 sig 0x000906ed, pf_mask 0x22, 2023-02-05, rev 0x00f8, size 104448 sig 0x000a0652, pf_mask 0x20, 2022-12-27, rev 0x00f6, size 96256 sig 0x000a0653, pf_mask 0x22, 2023-01-01, rev 0x00f6, size 97280 sig 0x000a0655, pf_mask 0x22, 2022-12-26, rev 0x00f6, size 96256 sig 0x000a0660, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 97280 sig 0x000a0661, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 96256 sig 0x000a0671, pf_mask 0x02, 2022-12-25, rev 0x0058, size 103424 sig 0x000b0671, pf_mask 0x32, 2023-02-06, rev 0x0113, size 207872 sig 0x000b06a2, pf_mask 0xc0, 2023-02-22, rev 0x4112, size 212992 sig 0x000b06a3, pf_mask 0xc0, 2023-02-22, rev 0x4112 * source: update symlinks to reflect id of the latest release, 20230512 3.20230214.1~deb11u1 (Thu, 16 Mar 2023 15:32:02 +0100) * Non-maintainer upload. * Backport package 3.20230214.1 for bullseye. * New upstream microcode datafile 20230214 - Includes Fixes for: - INTEL-SA-00700 (CVE-2022-21216): Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. - INTEL-SA-00730 (CVE-2022-33972): Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local acces - INTEL-SA-00738 (CVE-2022-33196): Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access. - INTEL-SA-00767 (CVE-2022-38090): Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access. * New Microcodes: sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 * Updated Microcodes: sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864 sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888 sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888 sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696 sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960 sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792 sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776 sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800 sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664 sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480 sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424 sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872 sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 3.20230214.1 (Sun, 12 Mar 2023 18:16:50 +0100) * New upstream microcode datafile 20230214 - Includes Fixes for: - INTEL-SA-00700: CVE-2022-21216 - INTEL-SA-00730: CVE-2022-33972 - INTEL-SA-00738: CVE-2022-33196 - INTEL-SA-00767: CVE-2022-38090 * New Microcodes: sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170 sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170 sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170 sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170 sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181 sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e * Updated Microcodes: sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864 sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888 sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888 sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696 sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960 sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792 sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776 sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800 sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664 sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429 sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429 sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480 sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424 sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872 sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20230214.1~deb10u1.dsc +++ apt/ucs_5.0-0-errata5.0-4/source/intel-microcode_3.20230808.1~deb10u1.dsc @@ -1,3 +1,225 @@ +3.20230808.1~deb10u1 [Tue, 15 Aug 2023 18:30:59 +0530] Utkarsh Gupta <utkarsh@debian.org>: + + * Non-maintainer upload by the LTS team. + * Backport 3.20230808.1 to buster. + +3.20230808.1~deb11u1 [Tue, 08 Aug 2023 20:51:57 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: + + * Backport to Debian Bullseye + * debian/control: revert non-free-firmware change + +3.20230808.1 [Tue, 08 Aug 2023 17:25:56 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: + + * New upstream microcode datafile 20230808 (closes: #1043305) + Mitigations for "Downfall" INTEL-SA-00828 (CVE-2022-40982), + INTEL-SA-00836 (CVE-2023-23908) and INTEL-SA-00837 (CVE-2022-41804) + * Updated microcodes: + sig 0x00050653, pf_mask 0x97, 2023-03-23, rev 0x1000181, size 36864 + sig 0x00050654, pf_mask 0xb7, 2023-03-06, rev 0x2007006, size 44032 + sig 0x00050656, pf_mask 0xbf, 2023-03-17, rev 0x4003604, size 38912 + sig 0x00050657, pf_mask 0xbf, 2023-03-17, rev 0x5003604, size 38912 + sig 0x0005065b, pf_mask 0xbf, 2023-03-21, rev 0x7002703, size 30720 + sig 0x000606a6, pf_mask 0x87, 2023-03-30, rev 0xd0003a5, size 297984 + sig 0x000706e5, pf_mask 0x80, 2023-02-26, rev 0x00bc, size 113664 + sig 0x000806c1, pf_mask 0x80, 2023-02-27, rev 0x00ac, size 111616 + sig 0x000806c2, pf_mask 0xc2, 2023-02-27, rev 0x002c, size 98304 + sig 0x000806d1, pf_mask 0xc2, 2023-02-27, rev 0x0046, size 103424 + sig 0x000806e9, pf_mask 0xc0, 2023-02-22, rev 0x00f4, size 106496 + sig 0x000806e9, pf_mask 0x10, 2023-02-23, rev 0x00f4, size 105472 + sig 0x000806ea, pf_mask 0xc0, 2023-02-23, rev 0x00f4, size 105472 + sig 0x000806eb, pf_mask 0xd0, 2023-02-23, rev 0x00f4, size 106496 + sig 0x000806ec, pf_mask 0x94, 2023-02-26, rev 0x00f8, size 106496 + sig 0x000806f8, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416 + sig 0x000806f7, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 + sig 0x000806f6, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 + sig 0x000806f5, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 + sig 0x000806f4, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1 + sig 0x000806f8, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184 + sig 0x000806f6, pf_mask 0x10, 2023-05-15, rev 0x2c000271 + sig 0x000806f5, pf_mask 0x10, 2023-05-15, rev 0x2c000271 + sig 0x000806f4, pf_mask 0x10, 2023-05-15, rev 0x2c000271 + sig 0x00090672, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160 + sig 0x00090675, pf_mask 0x07, 2023-04-18, rev 0x002e + sig 0x000b06f2, pf_mask 0x07, 2023-04-18, rev 0x002e + sig 0x000b06f5, pf_mask 0x07, 2023-04-18, rev 0x002e + sig 0x000906a3, pf_mask 0x80, 2023-04-18, rev 0x042c, size 219136 + sig 0x000906a4, pf_mask 0x80, 2023-04-18, rev 0x042c + sig 0x000906e9, pf_mask 0x2a, 2023-02-23, rev 0x00f4, size 108544 + sig 0x000906ea, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 104448 + sig 0x000906eb, pf_mask 0x02, 2023-02-23, rev 0x00f4, size 106496 + sig 0x000906ec, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 105472 + sig 0x000906ed, pf_mask 0x22, 2023-02-27, rev 0x00fa, size 106496 + sig 0x000a0652, pf_mask 0x20, 2023-02-23, rev 0x00f8, size 97280 + sig 0x000a0653, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280 + sig 0x000a0655, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280 + sig 0x000a0660, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 97280 + sig 0x000a0661, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 96256 + sig 0x000a0671, pf_mask 0x02, 2023-02-26, rev 0x0059, size 104448 + sig 0x000b0671, pf_mask 0x32, 2023-06-06, rev 0x0119, size 210944 + sig 0x000b06a2, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064 + sig 0x000b06a3, pf_mask 0xe0, 2023-06-06, rev 0x4119 + sig 0x000b06e0, pf_mask 0x11, 2023-04-12, rev 0x0011, size 136192 + * source: update symlinks to reflect id of the latest release, 20230808 + +3.20230512.1 [Tue, 16 May 2023 00:13:02 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: + + * New upstream microcode datafile 20230512 (closes: #1036013) + * New microcodes: + sig 0x000906a4, pf_mask 0x40, 2022-10-12, rev 0x0004, size 115712 + sig 0x000b06e0, pf_mask 0x01, 2022-12-19, rev 0x0010, size 134144 + * Updated microcodes: + sig 0x00050653, pf_mask 0x97, 2022-12-21, rev 0x1000171, size 36864 + sig 0x00050654, pf_mask 0xb7, 2022-12-21, rev 0x2006f05, size 44032 + sig 0x00050656, pf_mask 0xbf, 2022-12-21, rev 0x4003501, size 37888 + sig 0x00050657, pf_mask 0xbf, 2022-12-21, rev 0x5003501, size 37888 + sig 0x0005065b, pf_mask 0xbf, 2022-12-21, rev 0x7002601, size 29696 + sig 0x000606a6, pf_mask 0x87, 2022-12-28, rev 0xd000390, size 296960 + sig 0x000706e5, pf_mask 0x80, 2022-12-25, rev 0x00ba, size 113664 + sig 0x000806a1, pf_mask 0x10, 2023-01-13, rev 0x0033, size 34816 + sig 0x000806c1, pf_mask 0x80, 2022-12-28, rev 0x00aa, size 110592 + sig 0x000806c2, pf_mask 0xc2, 2022-12-28, rev 0x002a, size 97280 + sig 0x000806d1, pf_mask 0xc2, 2022-12-28, rev 0x0044, size 102400 + sig 0x000806e9, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472 + sig 0x000806e9, pf_mask 0x10, 2023-01-02, rev 0x00f2, size 105472 + sig 0x000806ea, pf_mask 0xc0, 2022-12-26, rev 0x00f2, size 105472 + sig 0x000806eb, pf_mask 0xd0, 2022-12-26, rev 0x00f2, size 105472 + sig 0x000806ec, pf_mask 0x94, 2022-12-26, rev 0x00f6, size 105472 + sig 0x000806f8, pf_mask 0x87, 2023-03-13, rev 0x2b000461, size 564224 + sig 0x000806f7, pf_mask 0x87, 2023-03-13, rev 0x2b000461 + sig 0x000806f6, pf_mask 0x87, 2023-03-13, rev 0x2b000461 + sig 0x000806f5, pf_mask 0x87, 2023-03-13, rev 0x2b000461 + sig 0x000806f4, pf_mask 0x87, 2023-03-13, rev 0x2b000461 + sig 0x000806f8, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1, size 595968 + sig 0x000806f6, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 + sig 0x000806f5, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 + sig 0x000806f4, pf_mask 0x10, 2023-02-14, rev 0x2c0001d1 + sig 0x000906a3, pf_mask 0x80, 2023-02-14, rev 0x042a, size 218112 + sig 0x000906a4, pf_mask 0x80, 2023-02-14, rev 0x042a + sig 0x000906e9, pf_mask 0x2a, 2022-12-26, rev 0x00f2, size 108544 + sig 0x000906ea, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448 + sig 0x000906eb, pf_mask 0x02, 2022-12-26, rev 0x00f2, size 105472 + sig 0x000906ec, pf_mask 0x22, 2023-01-12, rev 0x00f2, size 104448 + sig 0x000906ed, pf_mask 0x22, 2023-02-05, rev 0x00f8, size 104448 + sig 0x000a0652, pf_mask 0x20, 2022-12-27, rev 0x00f6, size 96256 + sig 0x000a0653, pf_mask 0x22, 2023-01-01, rev 0x00f6, size 97280 + sig 0x000a0655, pf_mask 0x22, 2022-12-26, rev 0x00f6, size 96256 + sig 0x000a0660, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 97280 + sig 0x000a0661, pf_mask 0x80, 2022-12-26, rev 0x00f6, size 96256 + sig 0x000a0671, pf_mask 0x02, 2022-12-25, rev 0x0058, size 103424 + sig 0x000b0671, pf_mask 0x32, 2023-02-06, rev 0x0113, size 207872 + sig 0x000b06a2, pf_mask 0xc0, 2023-02-22, rev 0x4112, size 212992 + sig 0x000b06a3, pf_mask 0xc0, 2023-02-22, rev 0x4112 + * source: update symlinks to reflect id of the latest release, 20230512 + +3.20230214.1~deb11u1 [Thu, 16 Mar 2023 15:32:02 +0100] Tobias Frost <tobi@debian.org>: + + * Non-maintainer upload. + * Backport package 3.20230214.1 for bullseye. + * New upstream microcode datafile 20230214 + - Includes Fixes for: (Closes: #1031334) + - INTEL-SA-00700 (CVE-2022-21216): + Insufficient granularity of access control in out-of-band management + in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a + privileged user to potentially enable escalation of privilege via + adjacent network access. + - INTEL-SA-00730 (CVE-2022-33972): + Incorrect calculation in microcode keying mechanism for some 3rd + Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged + user to potentially enable information disclosure via local acces + - INTEL-SA-00738 (CVE-2022-33196): + Incorrect default permissions in some memory controller configurations + for some Intel(R) Xeon(R) Processors when using Intel(R) Software + Guard Extensions which may allow a privileged user to potentially + enable escalation of privilege via local access. + - INTEL-SA-00767 (CVE-2022-38090): + Improper isolation of shared resources in some Intel(R) Processors + when using Intel(R) Software Guard Extensions may allow a privileged + user to potentially enable information disclosure via local access. + * New Microcodes: + sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 + sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 + * Updated Microcodes: + sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864 + sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888 + sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888 + sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696 + sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960 + sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792 + sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776 + sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800 + sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664 + sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 + sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 + sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 + sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480 + sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424 + sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872 + sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + +3.20230214.1 [Sun, 12 Mar 2023 18:16:50 +0100] Tobias Frost <tobi@debian.org>: + + * Non-maintainer upload. + * New upstream microcode datafile 20230214 + - Includes Fixes for: (Closes: #1031334) + - INTEL-SA-00700: CVE-2022-21216 + - INTEL-SA-00730: CVE-2022-33972 + - INTEL-SA-00738: CVE-2022-33196 + - INTEL-SA-00767: CVE-2022-38090 + * New Microcodes: + sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170 + sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181 + sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170 + sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181 + sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170 + sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181 + sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181 + sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170 + sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064 + sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181 + sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152 + sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e + sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992 + sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e + * Updated Microcodes: + sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864 + sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888 + sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888 + sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696 + sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960 + sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792 + sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776 + sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800 + sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664 + sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816 + sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c + sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136 + sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c + sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429 + sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112 + sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429 + sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x24000024, size 20480 + sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424 + sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872 + sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c + sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c + +3.20221108.2 [Fri, 17 Feb 2023 01:12:52 +0100] Cyril Brulebois <kibi@debian.org>: + + * Move source and binary from non-free/admin to non-free-firmware/admin + following the 2022 General Resolution about non-free firmware. + 3.20230214.1~deb10u1 [Sat, 01 Apr 2023 10:37:09 +0200] Tobias Frost <tobi@debian.org>: * Non-maintainer upload by the LTS Security Team. <http://piuparts.knut.univention.de/5.0-4/#6640949708475611571>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.0-4] 9a8c4d8d7a Bug #56462: intel-microcode 3.20230808.1~deb10u1 doc/errata/staging/intel-microcode.yaml | 184 +------------------------------- 1 file changed, 1 insertion(+), 183 deletions(-) [5.0-4] f417d88876 Bug #56462: intel-microcode 3.20230808.1~deb10u1 doc/errata/staging/intel-microcode.yaml | 198 ++++++++++++++++++++++++++++++++ 1 file changed, 198 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.0x784>