Your message dated Thu, 10 Aug 2023 13:19:09 +0000
with message-id <e1qu5zf-001wcj...@fasolo.debian.org>
and subject line Bug#1043381: fixed in amd64-microcode 3.20230808.1
has caused the Debian Bug report #1043381,
regarding amd64-microcode: Followups for 4th Gen AMD EPYC processors for 
CVE-2023-20569 / AMD Inception
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1043381: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043381
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: amd64-microcode
Version: 3.20230719.1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 3.20230414.1
Control: found -1 3.20230719.1~deb12u1  
Control: found -1 3.20191218.1
Control: found -1 3.20230719.1~deb11u1

Hi Henrique,

From
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
we did fortunately covered the 3rd Gen AMD EPYC processors microcode
updates for CVE-2023-20569 already with the previous done update:

amd64-microcode (3.20230719.1) unstable; urgency=high

  * Update package data from linux-firmware 20230625-39-g59fbffa9:
    * Fixes for CVE-2023-20593 "Zenbleed" on AMD Zen2 processors
      (closes: #1041863)
    * New Microcode patches:
      + Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008
    * Updated Microcode patches:
      + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a
      + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079
      + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d1
      + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001234
  * README: update for new release

 -- Henrique de Moraes Holschuh <h...@debian.org>  Mon, 24 Jul 2023 13:07:34 
-0300

(and so in {bookworm,bullseye,buster}-security as well).

There was a microcode followup today as
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=f2eb058afc57348cde66852272d6bf11da1eef8f
which followups for the 4th Gen AMD EPYC processors, Genoa
(Family=0x19 Model=0x11) and Bergamo (Family=0x19 Model=0xa0).

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: amd64-microcode
Source-Version: 3.20230808.1
Done: Henrique de Moraes Holschuh <h...@debian.org>

We believe that the bug you reported is fixed in the latest version of
amd64-microcode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1043...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <h...@debian.org> (supplier of updated 
amd64-microcode package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 10 Aug 2023 09:48:49 -0300
Source: amd64-microcode
Architecture: source
Version: 3.20230808.1
Distribution: unstable
Urgency: high
Maintainer: Henrique de Moraes Holschuh <h...@debian.org>
Changed-By: Henrique de Moraes Holschuh <h...@debian.org>
Closes: 1043381
Changes:
 amd64-microcode (3.20230808.1) unstable; urgency=high
 .
   * Update package data from linux-firmware 20230804-6-gf2eb058a
     * Fixes for CVE-2023-20593 "Zenbleed" on AMD Zen4 processors
     * Fixes for CVE-2023-20569 "AMD Inception" on AMD Zen4 processors
     (closes: #1043381)
   * WARNING: for proper operation on AMD Genoa and Bergamo processors,
     either up-to-date BIOS (with AGESA 1.0.0.8 or newer) or up-to-date
     Linux kernels (minimal versions on each active Linux stable branch:
     v4.19.289 v5.4.250 v5.10.187 v5.15.120 v6.1.37 v6.3.11 v6.4.1)
     are *required*
   * New Microcode patches:
     +  Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a10113e
     +  Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e
     +  Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212
     +  Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116
   * README: update for new release
   * debian/NEWS: AMD Genoa/Bergamo kernel version restrictions
   * debian/changelog: update entry for release 3.20230719.1, noting
     that it included fixes for "AMD Inception" for Zen3 processors
Checksums-Sha1:
 f85504329edf787c0559632e125cb9b03d0ce3b9 1695 amd64-microcode_3.20230808.1.dsc
 5217bbd94eb227bfe0c53284310d176b364be7d5 141876 
amd64-microcode_3.20230808.1.tar.xz
 29f9ea097c6484a45d4339b0dbf293245a45133a 6542 
amd64-microcode_3.20230808.1_amd64.buildinfo
Checksums-Sha256:
 3f810bbcc2e5c2ca3f18ac74ac60c8cb7e7f98a128b94e980efdb77cd1f4566d 1695 
amd64-microcode_3.20230808.1.dsc
 9d8eb8e874e19308a5178a42e22839972238f755801e88e32e4abcc48e6b6bd5 141876 
amd64-microcode_3.20230808.1.tar.xz
 083fb8be77e86e94826246623139171ac8f765856eb89e1f12da12cab6bae460 6542 
amd64-microcode_3.20230808.1_amd64.buildinfo
Files:
 3537c14259e37f521d76e3edcce7ccbf 1695 non-free-firmware/admin standard 
amd64-microcode_3.20230808.1.dsc
 a239967fb2c0f0bd023f998b4a14db96 141876 non-free-firmware/admin standard 
amd64-microcode_3.20230808.1.tar.xz
 c011ab58b236f953db4bcf7c0526a381 6542 non-free-firmware/admin standard 
amd64-microcode_3.20230808.1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ntcd
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to