Your message dated Sun, 11 Aug 2024 23:19:12 +0000
with message-id <e1sdhqc-000cth...@fasolo.debian.org>
and subject line Bug#1076128: fixed in amd64-microcode 3.20240710.1
has caused the Debian Bug report #1076128,
regarding amd64-microcode: New AMD cpu microcode for processor family 17h and 
19h
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1076128: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076128
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: amd64-microcode
Version: 3.20240116.2+nmu1
Severity: normal
X-Debbugs-Cc: car...@debian.org

Hi Henrique,

There appears to be new AMD cpu microcode for processor family 17h and
19h:

https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=091bd5adf19c7ab01214c64689952acb4833b21d

Can those bei uploaded? There is not much information on them, but
might it be worth to make the update as well land in the next bookworm
and bullseye point releases?

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: amd64-microcode
Source-Version: 3.20240710.1
Done: Henrique de Moraes Holschuh <h...@debian.org>

We believe that the bug you reported is fixed in the latest version of
amd64-microcode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1076...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <h...@debian.org> (supplier of updated 
amd64-microcode package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 11 Aug 2024 18:38:59 -0300
Source: amd64-microcode
Architecture: source
Version: 3.20240710.1
Distribution: unstable
Urgency: high
Maintainer: Henrique de Moraes Holschuh <h...@debian.org>
Changed-By: Henrique de Moraes Holschuh <h...@debian.org>
Closes: 1000193 1074514 1076128
Changes:
 amd64-microcode (3.20240710.1) unstable; urgency=high
 .
   * Update package data from linux-firmware 20240709-141-g59460076
     (closes: #1076128)
   * SECURITY UPDATE: Mitigates "Sinkclose" CVE-2023-31315 (AMD-SB-7014) on
     AMD Epyc processors: SMM lock bypass - Improper validation in a model
     specific register (MSR) could allow a malicious program with ring 0
     access (kernel) to modify SMM configuration while SMI lock is enabled,
     potentially leading to arbitrary code execution.
     Note: a firmware update is recommended for AMD Epyc (to protect the
     system as early as possible).  Many other AMD processor models are
     also vulnerable to SinkClose, and can only be fixed by a firmware
     update at this time.
   * Updated Microcode patches:
     + Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f
     + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c
     + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a
     + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248
     + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215
     + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238
     + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148
     + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5
   * README.Debian: "late" microcode updates are unsupported in Debian
     (closes: #1074514)
   * postinst: use dpkg-trigger to activate update-initramfs, this enables
     dracut integration (closes: #1000193)
Checksums-Sha1:
 22f539d64e9435445333ae8e251656aa949a264c 1695 amd64-microcode_3.20240710.1.dsc
 804de3bd488c199a05341ebe545a10826db08502 172156 
amd64-microcode_3.20240710.1.tar.xz
 5776c080ea19751a1b8a9b71b6de74bab8438503 6541 
amd64-microcode_3.20240710.1_amd64.buildinfo
Checksums-Sha256:
 532ace115f5a0c5e401de64f5a5bd55cc86f081743d84719a4b89f22d00c261c 1695 
amd64-microcode_3.20240710.1.dsc
 36617e22c9715d929cd834824626d799f7edad9c0f85dc08bb2082fc77d4a655 172156 
amd64-microcode_3.20240710.1.tar.xz
 5efb54354e0d4df1ddbd8989552fc452091e0e0957ca563a8c890c818de0bf74 6541 
amd64-microcode_3.20240710.1_amd64.buildinfo
Files:
 f483f53cbbae8da3ba6ece3c40c52a3e 1695 non-free-firmware/admin standard 
amd64-microcode_3.20240710.1.dsc
 7ea7f98715acfe60ad4d195169668d61 172156 non-free-firmware/admin standard 
amd64-microcode_3.20240710.1.tar.xz
 941101c2800ea94e49837262a1e9c7ef 6541 non-free-firmware/admin standard 
amd64-microcode_3.20240710.1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=zZ4q
-----END PGP SIGNATURE-----

Attachment: pgpq1ThpHLvSI.pgp
Description: PGP signature


--- End Message ---

Reply via email to