-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 12 Aug 2024 09:59:32 -0300 Source: amd64-microcode Architecture: source Version: 3.20240710.2~deb11u1 Distribution: bullseye Urgency: high Maintainer: Henrique de Moraes Holschuh Changed-By: Henrique de Moraes Holschuh Closes: 1000193 1062678 1074514 1076128 Changes: amd64-microcode (3.20240710.2~deb11u1) bullseye; urgency=high . * Rebuild for bullseye * Revert merged-usr changes from unstable * Revert move to non-free-firmware . amd64-microcode (3.20240710.2) unstable; urgency=high . * postrm: activate the update-initramfs dpkg trigger on remove/purge instead of always executing update-initramfs directly, just like it was done for postinst in 3.20240710.1: call update-initramfs directly only if the dpkg-trigger activation call fails. . amd64-microcode (3.20240710.1) unstable; urgency=high . * Update package data from linux-firmware 20240709-141-g59460076 (closes: #1076128) * SECURITY UPDATE: Mitigates "Sinkclose" CVE-2023-31315 (AMD-SB-7014) on AMD Epyc processors: SMM lock bypass - Improper validation in a model specific register (MSR) could allow a malicious program with ring 0 access (kernel) to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution. Note: a firmware update is recommended for AMD Epyc (to protect the system as early as possible). Many other AMD processor models are also vulnerable to SinkClose, and can only be fixed by a firmware update at this time. * Updated Microcode patches: + Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 * README.Debian: "late" microcode updates are unsupported in Debian (closes: #1074514) * postinst: use dpkg-trigger to activate update-initramfs, this enables dracut integration (closes: #1000193) . amd64-microcode (3.20240116.2) unstable; urgency=medium . * Add AMD-TEE firmware to the package (closes: #1062678) + amdtee: add amd_pmf TA firmware 20230906 * debian: install amdtee to /lib/firmware/amdtee * debian/control: update short and long descriptions * debian/copyright: update with amd-pmf license . amd64-microcode (3.20240116.1) unstable; urgency=medium . * Update package data from linux-firmware 20240115-80-gb4b04a5c * Updated Microcode patches: + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107b + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d3 + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001236 . amd64-microcode (3.20231019.1) unstable; urgency=medium . * Update package data from linux-firmware 20231019 * Updated Microcode patches: + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101144 + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101244 + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00213 . amd64-microcode (3.20230823.1) unstable; urgency=medium . * Update package data from linux-firmware 20230919 * New AMD-SEV firmware from AMD upstream (20230823) + Updated SEV firmware: Family 19h models 00h-0fh: version 1.55 build 8 + New SEV firmware: Family 19h models 10h-1fh: version 1.55 build 21 * amd-ucode: Add note on fam19h warnings. Checksums-Sha1: 192886bc93d93450751d393a985a6ebe7dbbd697 1718 amd64-microcode_3.20240710.2~deb11u1.dsc dad8b8c2cc53ec44d7fbce002f25e41ebaf83ecd 172208 amd64-microcode_3.20240710.2~deb11u1.tar.xz f3c40f8a5da7501ec66687debc143285e96dc9c9 6066 amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo Checksums-Sha256: 76aa9e8b2f5aaed41bd526515e662a9c6ab458c3c8ef70c8aa7fe1cbd78b9315 1718 amd64-microcode_3.20240710.2~deb11u1.dsc 56d35405e8e40d8798549c5210a7709862a3d50f72bd501149454014437a09f4 172208 amd64-microcode_3.20240710.2~deb11u1.tar.xz c55198edb93777593d0b2a29088af1895fc398632dfb2cfb80d2631a1492a4ae 6066 amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo Files: a0f0c9bc500592f5ad4d6e3d20d6ba7e 1718 non-free/admin standard amd64-microcode_3.20240710.2~deb11u1.dsc 7249bbf0ce98784715035d5de2ae400e 172208 non-free/admin standard amd64-microcode_3.20240710.2~deb11u1.tar.xz 0337f9ff6c1b8ae4f5728769b05bcd0b 6066 non-free/admin standard amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpvbMGUAhfu+gsYOwlOXoPKamj0cFAma6CO4ACgkQlOXoPKam j0d/cw//ShhMW70J6kqDgDUQHonuOn+gbkNYobrPxTlTsMx6CivbgmJY00oN641E EuqMyLibZRmhhM/bAiMZ8MsPNnmp5fMu/2OVy9OpAAt/26XrgrVGj2775joMJPS8 15YLvcLw3rFHwfRIa7bXk4vjNxovD48DBxqviNsH6KCgAjJPDf2GIen6qw1ZGNWp CsXG+LwKsj59BmSqFMsw7I2Okg9jmPcZoY9Pj3Sah0zlJyod9qZDSsiMCiw3IRqK sPjHD+A+1ud5TmnGnPdjrkkmDf7n1PvGey48yk3MaBwEosfvLCzL7JKAG4+P6LKM +P/4ORkk0TV1snCBjlPRO320h7QfJWRQ5gtH8WV2XexPC+jxbgSvnLOmZ6uz1Il9 Q/JjW34tM3r2ajuCxxWyS02zWvnAoj/KOYWtHaoGOAfW8WkasQOL66nK/j++enpa NJurY4AXuXK2RK7uLA98Xaav0txBK215WN56qK0PCVrJBlrZMqctMSb/zyi9QpB6 G3lh+OW5gqLz8zNeabqK1PPu4dJFdnYFGXHvpkJ9D9+M+/GRIu14tyZAl8qp3eYy tZshFbBGfsFr8lLGcCW3fl4ctueYLVH+w1nL8NeCs7n+wzpIPlwEKe4OKN65rAiP aVlUhx9QQrVuzWbY46xJm78xXJFS+0KO/WA95eCGV0Ojk9AOokU= =6stt -----END PGP SIGNATURE-----