New Debian intel-microcode 3.20240910.1~deb10u1 fixes: This update addresses the following issues: 3.20240910.1~deb10u1 (Sun, 24 Nov 2024 13:47:06 +0100) * Non-maintainer upload by the ELTS Security Team. * Rebuild for buster. 3.20240910.1~deb11u1 (Sun, 24 Nov 2024 13:11:47 +0100) [ Tobias Frost ] * Non-maintainer upload by the LTS security team. Thanks to Henrique for preparing the package! [ Henrique de Moraes Holschuh ] * Build for bullseye * All trixie-only changes (from 3.20240813.2) are reverted on this branch 3.20240910.1 (Sat, 21 Sep 2024 16:40:07 -0300) * New upstream microcode datafile 20240910 - Mitigations for INTEL-SA-01103 (CVE-2024-23984) A potential security vulnerability in the Running Average Power Limit (RAPL) interface for some Intel Processors may allow information disclosure. - Mitigations for INTEL-SA-01097 (CVE-2024-24968) A potential security vulnerability in some Intel Processors may allow denial of service. - Fixes for unspecified functional issues on several processor models - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but THE VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED THROUGH THE FIT TABLE IN FIRMWARE. Contact your system vendor for a firmware update that includes the appropriate microcode update for your processor. * Updated Microcodes: sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256 sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036 sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036 sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036 sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208 sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434 sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216 sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040 sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160 sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122 sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122 sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240 * Update changelog for 3.20240813.1 with new information * Update changelog for 3.20240514.1 with new information * source: update symlinks to reflect id of the latest release, 20240910
--- mirror/ftp/pool/main/i/intel-microcode/intel-microcode_3.20240813.1~deb10u1.dsc +++ apt/ucs_5.0-0-errata5.0-9/source/intel-microcode_3.20240910.1~deb10u1.dsc @@ -1,3 +1,52 @@ +3.20240910.1~deb10u1 [Sun, 24 Nov 2024 13:47:06 +0100] Tobias Frost <tobi@debian.org>: + + * Non-maintainer upload by the ELTS Security Team. + * Rebuild for buster. + +3.20240910.1~deb11u1 [Sun, 24 Nov 2024 13:11:47 +0100] Tobias Frost <tobi@debian.org>: + + [ Tobias Frost ] + * Non-maintainer upload by the LTS security team. Thanks to Henrique for + preparing the package! + + [ Henrique de Moraes Holschuh ] + * Build for bullseye + * All trixie-only changes (from 3.20240813.2) are reverted on this branch + +3.20240910.1 [Sat, 21 Sep 2024 16:40:07 -0300] Henrique de Moraes Holschuh <hmh@debian.org>: + + * New upstream microcode datafile 20240910 (closes: #1081363) + - Mitigations for INTEL-SA-01103 (CVE-2024-23984) + A potential security vulnerability in the Running Average Power Limit + (RAPL) interface for some Intel Processors may allow information + disclosure. + - Mitigations for INTEL-SA-01097 (CVE-2024-24968) + A potential security vulnerability in some Intel Processors may allow + denial of service. + - Fixes for unspecified functional issues on several processor models + - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A + FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but + THE VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED + THROUGH THE FIT TABLE IN FIRMWARE. Contact your system vendor for a + firmware update that includes the appropriate microcode update for + your processor. + * Updated Microcodes: + sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256 + sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036 + sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036 + sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036 + sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208 + sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434 + sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216 + sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040 + sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122 + sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122 + sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240 + * Update changelog for 3.20240813.1 with new information + * Update changelog for 3.20240514.1 with new information + * source: update symlinks to reflect id of the latest release, 20240910 + 3.20240813.1~deb10u1 [Thu, 22 Aug 2024 01:58:10 +0200] Daniel Leidert <dleidert@debian.org>: * Non-maintainer upload by the LTS Security Team. <http://piuparts.knut.univention.de/5.0-9/#4929868293182490723>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.0-9] 05fd5de1dc Bug #57768: intel-microcode 3.20240910.1~deb10u1 doc/errata/staging/intel-microcode.yaml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.0x1182>