Your message dated Wed, 21 Aug 2024 20:33:20 +0000
with message-id <e1sgs1a-00du0l...@fasolo.debian.org>
and subject line Bug#1074514: fixed in amd64-microcode 3.20240710.2~deb11u1
has caused the Debian Bug report #1074514,
regarding README.Debian still mentions /sys/devices/system/cpu/microcode/reload 
(not enabled since kernel 5.19)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1074514: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074514
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: amd64-microcode
Version: 3.20240116.2+nmu1
Severity: minor

It would be nice to remove this part from the README.Debian,
since it is misleading.

Thanks,

/mjt

--- End Message ---
--- Begin Message ---
Source: amd64-microcode
Source-Version: 3.20240710.2~deb11u1
Done: Henrique de Moraes Holschuh <h...@debian.org>

We believe that the bug you reported is fixed in the latest version of
amd64-microcode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1074...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <h...@debian.org> (supplier of updated 
amd64-microcode package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 12 Aug 2024 09:59:32 -0300
Source: amd64-microcode
Architecture: source
Version: 3.20240710.2~deb11u1
Distribution: bullseye
Urgency: high
Maintainer: Henrique de Moraes Holschuh <h...@debian.org>
Changed-By: Henrique de Moraes Holschuh <h...@debian.org>
Closes: 1000193 1062678 1074514 1076128
Changes:
 amd64-microcode (3.20240710.2~deb11u1) bullseye; urgency=high
 .
   * Rebuild for bullseye
   * Revert merged-usr changes from unstable
   * Revert move to non-free-firmware
 .
 amd64-microcode (3.20240710.2) unstable; urgency=high
 .
   * postrm: activate the update-initramfs dpkg trigger on remove/purge
     instead of always executing update-initramfs directly, just like it
     was done for postinst in 3.20240710.1: call update-initramfs directly
     only if the dpkg-trigger activation call fails.
 .
 amd64-microcode (3.20240710.1) unstable; urgency=high
 .
   * Update package data from linux-firmware 20240709-141-g59460076
     (closes: #1076128)
   * SECURITY UPDATE: Mitigates "Sinkclose" CVE-2023-31315 (AMD-SB-7014) on
     AMD Epyc processors: SMM lock bypass - Improper validation in a model
     specific register (MSR) could allow a malicious program with ring 0
     access (kernel) to modify SMM configuration while SMI lock is enabled,
     potentially leading to arbitrary code execution.
     Note: a firmware update is recommended for AMD Epyc (to protect the
     system as early as possible).  Many other AMD processor models are
     also vulnerable to SinkClose, and can only be fixed by a firmware
     update at this time.
   * Updated Microcode patches:
     + Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f
     + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c
     + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a
     + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248
     + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215
     + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238
     + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148
     + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5
   * README.Debian: "late" microcode updates are unsupported in Debian
     (closes: #1074514)
   * postinst: use dpkg-trigger to activate update-initramfs, this enables
     dracut integration (closes: #1000193)
 .
 amd64-microcode (3.20240116.2) unstable; urgency=medium
 .
   * Add AMD-TEE firmware to the package (closes: #1062678)
     + amdtee: add amd_pmf TA firmware 20230906
   * debian: install amdtee to /lib/firmware/amdtee
   * debian/control: update short and long descriptions
   * debian/copyright: update with amd-pmf license
 .
 amd64-microcode (3.20240116.1) unstable; urgency=medium
 .
   * Update package data from linux-firmware 20240115-80-gb4b04a5c
   * Updated Microcode patches:
     + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107b
     + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d3
     + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001236
 .
 amd64-microcode (3.20231019.1) unstable; urgency=medium
 .
   * Update package data from linux-firmware 20231019
   * Updated Microcode patches:
     + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101144
     + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101244
     + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00213
 .
 amd64-microcode (3.20230823.1) unstable; urgency=medium
 .
   * Update package data from linux-firmware 20230919
     * New AMD-SEV firmware from AMD upstream (20230823)
       + Updated SEV firmware:
         Family 19h models 00h-0fh: version 1.55 build 8
       + New SEV firmware:
         Family 19h models 10h-1fh: version 1.55 build 21
   * amd-ucode: Add note on fam19h warnings.
Checksums-Sha1:
 192886bc93d93450751d393a985a6ebe7dbbd697 1718 
amd64-microcode_3.20240710.2~deb11u1.dsc
 dad8b8c2cc53ec44d7fbce002f25e41ebaf83ecd 172208 
amd64-microcode_3.20240710.2~deb11u1.tar.xz
 f3c40f8a5da7501ec66687debc143285e96dc9c9 6066 
amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo
Checksums-Sha256:
 76aa9e8b2f5aaed41bd526515e662a9c6ab458c3c8ef70c8aa7fe1cbd78b9315 1718 
amd64-microcode_3.20240710.2~deb11u1.dsc
 56d35405e8e40d8798549c5210a7709862a3d50f72bd501149454014437a09f4 172208 
amd64-microcode_3.20240710.2~deb11u1.tar.xz
 c55198edb93777593d0b2a29088af1895fc398632dfb2cfb80d2631a1492a4ae 6066 
amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo
Files:
 a0f0c9bc500592f5ad4d6e3d20d6ba7e 1718 non-free/admin standard 
amd64-microcode_3.20240710.2~deb11u1.dsc
 7249bbf0ce98784715035d5de2ae400e 172208 non-free/admin standard 
amd64-microcode_3.20240710.2~deb11u1.tar.xz
 0337f9ff6c1b8ae4f5728769b05bcd0b 6066 non-free/admin standard 
amd64-microcode_3.20240710.2~deb11u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6stt
-----END PGP SIGNATURE-----

Attachment: pgpaPf0_nMluR.pgp
Description: PGP signature


--- End Message ---

Reply via email to