Your message dated Mon, 16 May 2022 15:20:13 +0000
with message-id <[email protected]>
and subject line Bug#1010947: fixed in intel-microcode 3.20220510.1
has caused the Debian Bug report #1010947,
regarding intel-microcode: CVE-2022-21151 / INTEL-SA-00617
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1010947: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: intel-microcode
Version: 3.20220207.1
Severity: important
Tags: security upstream fixed-upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 3.20220207.1~deb11u1
Control: found -1 3.20210608.2~deb10u1

Hi,

The following vulnerability was published for intel-microcode.

CVE-2022-21151[0]:
| Processor optimization removal or modification of security-critical
| code for some Intel(R) Processors may allow an authenticated user to
| potentially enable information disclosure via local access.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-21151
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
[1] 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
[2] 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: intel-microcode
Source-Version: 3.20220510.1
Done: Henrique de Moraes Holschuh <[email protected]>

We believe that the bug you reported is fixed in the latest version of
intel-microcode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <[email protected]> (supplier of updated 
intel-microcode package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 15 May 2022 20:09:05 -0300
Source: intel-microcode
Architecture: source
Version: 3.20220510.1
Distribution: unstable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <[email protected]>
Changed-By: Henrique de Moraes Holschuh <[email protected]>
Closes: 1010947
Changes:
 intel-microcode (3.20220510.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20220510
     * Fixes INTEL-SA-000617, CVE-2022-21151:
       Processor optimization removal or modification of security-critical
       code may allow an authenticated user to potentially enable information
       disclosure via local access (closes: #1010947)
     * Fixes several errata (functional issues) on Xeon Scalable, Atom C3000,
       Atom E3900
     * New Microcodes:
       sig 0x00090672, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
       sig 0x00090675, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
       sig 0x000906a3, pf_mask 0x80, 2022-03-24, rev 0x041c, size 212992
       sig 0x000906a4, pf_mask 0x80, 2022-03-24, rev 0x041c, size 212992
       sig 0x000b06f2, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
       sig 0x000b06f5, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
     * Updated Microcodes:
       sig 0x00030679, pf_mask 0x0f, 2019-07-10, rev 0x090d, size 52224
       sig 0x000406e3, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 106496
       sig 0x00050653, pf_mask 0x97, 2021-11-13, rev 0x100015d, size 34816
       sig 0x00050654, pf_mask 0xb7, 2021-11-13, rev 0x2006d05, size 43008
       sig 0x00050656, pf_mask 0xbf, 2021-12-10, rev 0x4003302, size 37888
       sig 0x00050657, pf_mask 0xbf, 2021-12-10, rev 0x5003302, size 37888
       sig 0x0005065b, pf_mask 0xbf, 2021-11-19, rev 0x7002501, size 29696
       sig 0x000506c9, pf_mask 0x03, 2021-11-16, rev 0x0048, size 17408
       sig 0x000506e3, pf_mask 0x36, 2021-11-12, rev 0x00f0, size 109568
       sig 0x000506f1, pf_mask 0x01, 2021-12-02, rev 0x0038, size 11264
       sig 0x000606a6, pf_mask 0x87, 2022-03-30, rev 0xd000363, size 294912
       sig 0x000706a1, pf_mask 0x01, 2021-11-22, rev 0x003a, size 75776
       sig 0x000706a8, pf_mask 0x01, 2021-11-22, rev 0x001e, size 75776
       sig 0x000706e5, pf_mask 0x80, 2022-03-09, rev 0x00b0, size 112640
       sig 0x000806a1, pf_mask 0x10, 2022-03-26, rev 0x0031, size 34816
       sig 0x000806c1, pf_mask 0x80, 2022-02-01, rev 0x00a4, size 109568
       sig 0x000806c2, pf_mask 0xc2, 2021-12-07, rev 0x0026, size 97280
       sig 0x000806d1, pf_mask 0xc2, 2021-12-07, rev 0x003e, size 102400
       sig 0x000806e9, pf_mask 0x10, 2021-11-12, rev 0x00f0, size 105472
       sig 0x000806e9, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 105472
       sig 0x000806ea, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 105472
       sig 0x000806eb, pf_mask 0xd0, 2021-11-15, rev 0x00f0, size 105472
       sig 0x000806ec, pf_mask 0x94, 2021-11-17, rev 0x00f0, size 105472
       sig 0x00090661, pf_mask 0x01, 2022-02-03, rev 0x0016, size 20480
       sig 0x000906c0, pf_mask 0x01, 2022-02-19, rev 0x24000023, size 20480
       sig 0x000906e9, pf_mask 0x2a, 2021-11-12, rev 0x00f0, size 108544
       sig 0x000906ea, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 104448
       sig 0x000906eb, pf_mask 0x02, 2021-11-12, rev 0x00f0, size 105472
       sig 0x000906ec, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 104448
       sig 0x000906ed, pf_mask 0x22, 2021-11-16, rev 0x00f0, size 104448
       sig 0x000a0652, pf_mask 0x20, 2021-11-16, rev 0x00f0, size 96256
       sig 0x000a0653, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 97280
       sig 0x000a0655, pf_mask 0x22, 2021-11-16, rev 0x00f0, size 96256
       sig 0x000a0660, pf_mask 0x80, 2021-11-15, rev 0x00f0, size 96256
       sig 0x000a0661, pf_mask 0x80, 2021-11-16, rev 0x00f0, size 96256
       sig 0x000a0671, pf_mask 0x02, 2022-03-09, rev 0x0053, size 103424
   * source: update symlinks to reflect id of the latest release, 20220510
 .
 intel-microcode (3.20220419.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20220419
     * Fixes errata APLI-11 in Atom E3900 series processors
     * Updated Microcodes:
       sig 0x000506ca, pf_mask 0x03, 2021-11-16, rev 0x0028, size 16384
   * source: update symlinks to reflect id of the latest release, 20220419
Checksums-Sha1:
 be099f476d9573236cd75c990bcfe8c49d50d284 1789 intel-microcode_3.20220510.1.dsc
 c165225f3c01dfad2d5662566490949e7def7b91 4759064 
intel-microcode_3.20220510.1.tar.xz
 3f90d9e3aa98c7481d2868da726094a33e957baf 6446 
intel-microcode_3.20220510.1_amd64.buildinfo
Checksums-Sha256:
 3e3dd7f488acee3b7db7b3a8d40f35c80f34c1e3b5fda4200d555f929eb7e00f 1789 
intel-microcode_3.20220510.1.dsc
 49752447c1b905dd130699cdef09fb2bba47b6f413d27787c98a5569273e283e 4759064 
intel-microcode_3.20220510.1.tar.xz
 2b15f3e2493b05f1236816d7ebdfdf35d0b71fd0c1cb8c37ffa7c0ee34d19231 6446 
intel-microcode_3.20220510.1_amd64.buildinfo
Files:
 9e43f7ad07ac9fe17493d7967a189b87 1789 non-free/admin standard 
intel-microcode_3.20220510.1.dsc
 c34bfc81cf45bdf3612c994ebd62f2fe 4759064 non-free/admin standard 
intel-microcode_3.20220510.1.tar.xz
 e6b6bdf8bdf85ae3c3bc1608ce3b2f97 6446 non-free/admin standard 
intel-microcode_3.20220510.1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=SLS4
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to