Your message dated Wed, 21 Aug 2024 21:47:08 +0000 with message-id <e1sgtaa-00dgao...@fasolo.debian.org> and subject line Bug#1074514: fixed in amd64-microcode 3.20240710.2~deb12u1 has caused the Debian Bug report #1074514, regarding README.Debian still mentions /sys/devices/system/cpu/microcode/reload (not enabled since kernel 5.19) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1074514: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074514 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: amd64-microcode Version: 3.20240116.2+nmu1 Severity: minor It would be nice to remove this part from the README.Debian, since it is misleading. Thanks, /mjt
--- End Message ---
--- Begin Message ---Source: amd64-microcode Source-Version: 3.20240710.2~deb12u1 Done: Henrique de Moraes Holschuh <h...@debian.org> We believe that the bug you reported is fixed in the latest version of amd64-microcode, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1074...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Henrique de Moraes Holschuh <h...@debian.org> (supplier of updated amd64-microcode package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 12 Aug 2024 09:37:38 -0300 Source: amd64-microcode Architecture: source Version: 3.20240710.2~deb12u1 Distribution: bookworm Urgency: high Maintainer: Henrique de Moraes Holschuh <h...@debian.org> Changed-By: Henrique de Moraes Holschuh <h...@debian.org> Closes: 1000193 1062678 1074514 1076128 Changes: amd64-microcode (3.20240710.2~deb12u1) bookworm; urgency=high . * Rebuild for bookworm (revert merged-usr changes from unstable) . amd64-microcode (3.20240710.2) unstable; urgency=high . * postrm: activate the update-initramfs dpkg trigger on remove/purge instead of always executing update-initramfs directly, just like it was done for postinst in 3.20240710.1: call update-initramfs directly only if the dpkg-trigger activation call fails. . amd64-microcode (3.20240710.1) unstable; urgency=high . * Update package data from linux-firmware 20240709-141-g59460076 (closes: #1076128) * SECURITY UPDATE: Mitigates "Sinkclose" CVE-2023-31315 (AMD-SB-7014) on AMD Epyc processors: SMM lock bypass - Improper validation in a model specific register (MSR) could allow a malicious program with ring 0 access (kernel) to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution. Note: a firmware update is recommended for AMD Epyc (to protect the system as early as possible). Many other AMD processor models are also vulnerable to SinkClose, and can only be fixed by a firmware update at this time. * Updated Microcode patches: + Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 * README.Debian: "late" microcode updates are unsupported in Debian (closes: #1074514) * postinst: use dpkg-trigger to activate update-initramfs, this enables dracut integration (closes: #1000193) . amd64-microcode (3.20240116.2) unstable; urgency=medium . * Add AMD-TEE firmware to the package (closes: #1062678) + amdtee: add amd_pmf TA firmware 20230906 * debian: install amdtee to /lib/firmware/amdtee * debian/control: update short and long descriptions * debian/copyright: update with amd-pmf license . amd64-microcode (3.20240116.1) unstable; urgency=medium . * Update package data from linux-firmware 20240115-80-gb4b04a5c * Updated Microcode patches: + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107b + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d3 + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001236 . amd64-microcode (3.20231019.1) unstable; urgency=medium . * Update package data from linux-firmware 20231019 * Updated Microcode patches: + Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101144 + Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101244 + Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00213 . amd64-microcode (3.20230823.1) unstable; urgency=medium . * Update package data from linux-firmware 20230919 * New AMD-SEV firmware from AMD upstream (20230823) + Updated SEV firmware: Family 19h models 00h-0fh: version 1.55 build 8 + New SEV firmware: Family 19h models 10h-1fh: version 1.55 build 21 * amd-ucode: Add note on fam19h warnings. Checksums-Sha1: c2a782cb645433429d0caac5a26dd2b2a55c85fc 1727 amd64-microcode_3.20240710.2~deb12u1.dsc 4030a4706163e673a4386554cf03630cb04e928b 172240 amd64-microcode_3.20240710.2~deb12u1.tar.xz 857c2d59a271097c0d8b843d0c4744b73c7f42ed 6204 amd64-microcode_3.20240710.2~deb12u1_amd64.buildinfo Checksums-Sha256: 8acbe51a2676c63c80797bf94520fcc436c46798ecc9d35b719da3e8a93007a6 1727 amd64-microcode_3.20240710.2~deb12u1.dsc af1cfb112a1941c00766dd76d02c8d6981411b2965c4b9173b0b3d97827faf3e 172240 amd64-microcode_3.20240710.2~deb12u1.tar.xz 84328fe962026d1e9b68e6ab1ad6071cd1113681695d88f99f8c7cc4a783f65a 6204 amd64-microcode_3.20240710.2~deb12u1_amd64.buildinfo Files: 3137ce32d49017b7a46f46236c88a273 1727 non-free-firmware/admin standard amd64-microcode_3.20240710.2~deb12u1.dsc 2048413a3fee46a68b90ed0234b351db 172240 non-free-firmware/admin standard amd64-microcode_3.20240710.2~deb12u1.tar.xz df4110121e213f79cf4f6a9f2aff8329 6204 non-free-firmware/admin standard amd64-microcode_3.20240710.2~deb12u1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpvbMGUAhfu+gsYOwlOXoPKamj0cFAma6CPYACgkQlOXoPKam j0d/2xAAzwm5366s9Vt6MRvSJDKPxw6S/V0+a0X+y3t944cgcoS6mfBVq2x4dK9m 9PoZZ7zV0jCTHY3HsiwLinMFowo/XC3MSyOpOg+bg0YXBNkGUYKJ01m0Ah8ckGo9 +tRujmDEDl8TBm7P4sQQDKFNpMQO5PyOGZnCy2LsKhOmAY2HPkEPLu/s+DREZ5sB OZuday8oGC2XStkh0k4XPL5OKlQYWj67rEPPWkEjaytlbGQF0SGLaT6hHdxwLXGo cc39eaNEipHVcyWQyc7bhnuNAGk8KmSXf4BG0kxdkYJZYhRUJYR3+ugzbO8rfhFu WgOVw3mZLRbCXVqhwhJeapw5V4jbjOSq4cBIxkpe40Qt5l8o0yWu3F5yhsZ5SFm6 Ho5RiVi8zi+dAuEwac2bjCqe8E2a90YFeekHmkw1ixEi3EnBIzzlwCux+OEAwsDX F8REEgqyU+CToZjxUOftk4mRUbDhNmuYmUUb8ZF3ZbwriNdo2JET4IN1IcVeLoyx MltwdLpljCoDo6mwFYzD67vVXe08ulWENfaErxXTFJ4zu3flKsT4mBLvjHlZ2pT6 OGTl35udRboqX1Yk/ZnSZ2FtwCNBYMUY9QX+AvD0qYI5wap2LvID4TW+19PS9P43 iU1xZFb02c4HKZuR96QxXEBeqhVIE8U8OKHl0wnVxBUAO8WgM/o= =KjSl -----END PGP SIGNATURE-----pgpRRyWrBIq2e.pgp
Description: PGP signature
--- End Message ---