[ubuntu/plucky-proposed] intel-microcode 3.20241112.1ubuntu1 (Accepted)

Alex Murray alex.murray at canonical.com
Mon Nov 18 07:16:16 UTC 2024


intel-microcode (3.20241112.1ubuntu1) plucky; urgency=medium

  * Merge from Debian unstable; remaining changes:
    - debian/tests/initramfs: update test for location of GenuineIntel.bin
      since in Ubuntu this lives under the early2 initramfs so test for its
      presence in any early
    - debian/tests/control: update generic kernel dep as an alternative to
      the original one from Debian
  * debian/tests/initramfs: invoke update-initramfs with -c to ensure an
    initrd is generated if one does not already exist so that the rest of
    the test can proceed as expected

intel-microcode (3.20241112.1) unstable; urgency=medium

  * New upstream microcode datafile 20241112 (closes: #1086483)
    - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
      Improper Finite State Machines (FSMs) in the Hardware logic in some
      4th and 5th Generation Intel Xeon Processors may allow an authorized
      user to potentially enable denial of service via local access.
    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
      Potential security vulnerabilities in some Intel Xeon processors
      using Intel SGX may allow escalation of privilege.  Intel disclosed
      that some processor models were already fixed by a previous
      microcode update.
    - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
      Improper finite state machines (FSMs) in hardware logic in some
      Intel Processors may allow an privileged user to potentially enable a
      denial of service via local access.
    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
      A potential security vulnerability in the Running Average Power Limit
      (RAPL) interface for some Intel Processors may allow information
      disclosure.  Added mitigations for more processor models.
  * Updated Microcodes:
    sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
    sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
    sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
    sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
    sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
    sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
    sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
    sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
    sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
    sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
    sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
    sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
    sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
    sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
    sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
    sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
    sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
  * source: update symlinks to reflect id of the latest release, 20241112
  * Update changelog for 3.20240910.1 and 3.20240813.1 with new information:
    INTEL-SA-1103 was addressed by 3.20240813.1 for some processor models,
    and not by 3.20240910. INTEL-SA-1079 was addressed by 3.20240910.1 for
    some processor models.

intel-microcode (3.20241029.1) UNRELEASED; urgency=medium

  * New upstream microcode datafile 20241029
    - Not relevant for operating system microcode updates
    - Only when loaded from firmware, this update fixes the critical,
      potentially hardware-damaging errata RPL061: Incorrect Internal
      Voltage Request on Raptor Lake (Core 13th/14th gen) Intel
      processors.
  * Updated Microcodes:
    sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968

intel-microcode (3.20240910.1) unstable; urgency=medium

  * New upstream microcode datafile 20240910 (closes: #1081363)
    - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
      Improper finite state machines (FSMs) in hardware logic in some
      Intel Processors may allow an privileged user to potentially enable a
      denial of service via local access.
    - Fixes for unspecified functional issues on several processor models
    - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
      FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
      THE VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED
      THROUGH THE FIT TABLE IN FIRMWARE.  Contact your system vendor for a
      firmware update that includes the appropriate microcode update for
      your processor.
  * Updated Microcodes:
    sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
    sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036
    sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036
    sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036
    sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
    sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434
    sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216
    sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040
    sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
    sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122
    sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122
    sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240
  * Update changelog for 3.20240813.1 with new information
  * Update changelog for 3.20240514.1 with new information
  * source: update symlinks to reflect id of the latest release, 20240910

Date: Mon, 18 Nov 2024 15:31:16 +1030
Changed-By: Alex Murray <alex.murray at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20241112.1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Mon, 18 Nov 2024 15:31:16 +1030
Source: intel-microcode
Built-For-Profiles: noudeb
Architecture: source
Version: 3.20241112.1ubuntu1
Distribution: plucky
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Alex Murray <alex.murray at canonical.com>
Closes: 1081363 1086483
Changes:
 intel-microcode (3.20241112.1ubuntu1) plucky; urgency=medium
 .
   * Merge from Debian unstable; remaining changes:
     - debian/tests/initramfs: update test for location of GenuineIntel.bin
       since in Ubuntu this lives under the early2 initramfs so test for its
       presence in any early
     - debian/tests/control: update generic kernel dep as an alternative to
       the original one from Debian
   * debian/tests/initramfs: invoke update-initramfs with -c to ensure an
     initrd is generated if one does not already exist so that the rest of
     the test can proceed as expected
 .
 intel-microcode (3.20241112.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20241112 (closes: #1086483)
     - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
       Improper Finite State Machines (FSMs) in the Hardware logic in some
       4th and 5th Generation Intel Xeon Processors may allow an authorized
       user to potentially enable denial of service via local access.
     - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
       Potential security vulnerabilities in some Intel Xeon processors
       using Intel SGX may allow escalation of privilege.  Intel disclosed
       that some processor models were already fixed by a previous
       microcode update.
     - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
       Improper finite state machines (FSMs) in hardware logic in some
       Intel Processors may allow an privileged user to potentially enable a
       denial of service via local access.
     - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
       A potential security vulnerability in the Running Average Power Limit
       (RAPL) interface for some Intel Processors may allow information
       disclosure.  Added mitigations for more processor models.
   * Updated Microcodes:
     sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
     sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
     sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
     sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
     sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
     sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
     sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
     sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
     sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
     sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
     sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
     sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
     sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
     sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
     sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
     sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
     sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
   * source: update symlinks to reflect id of the latest release, 20241112
   * Update changelog for 3.20240910.1 and 3.20240813.1 with new information:
     INTEL-SA-1103 was addressed by 3.20240813.1 for some processor models,
     and not by 3.20240910. INTEL-SA-1079 was addressed by 3.20240910.1 for
     some processor models.
 .
 intel-microcode (3.20241029.1) UNRELEASED; urgency=medium
 .
   * New upstream microcode datafile 20241029
     - Not relevant for operating system microcode updates
     - Only when loaded from firmware, this update fixes the critical,
       potentially hardware-damaging errata RPL061: Incorrect Internal
       Voltage Request on Raptor Lake (Core 13th/14th gen) Intel
       processors.
   * Updated Microcodes:
     sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
 .
 intel-microcode (3.20240910.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20240910 (closes: #1081363)
     - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
       Improper finite state machines (FSMs) in hardware logic in some
       Intel Processors may allow an privileged user to potentially enable a
       denial of service via local access.
     - Fixes for unspecified functional issues on several processor models
     - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
       FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
       THE VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED
       THROUGH THE FIT TABLE IN FIRMWARE.  Contact your system vendor for a
       firmware update that includes the appropriate microcode update for
       your processor.
   * Updated Microcodes:
     sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
     sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036
     sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036
     sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036
     sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
     sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434
     sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216
     sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040
     sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
     sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122
     sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122
     sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240
   * Update changelog for 3.20240813.1 with new information
   * Update changelog for 3.20240514.1 with new information
   * source: update symlinks to reflect id of the latest release, 20240910
Checksums-Sha1:
 57a1611cd191ed52bc46cce25fcaa5f145ae4d74 1696 intel-microcode_3.20241112.1ubuntu1.dsc
 fa36010071df85be7467b26e10013be92635acb7 7782100 intel-microcode_3.20241112.1ubuntu1.tar.xz
 c9b13b0ff754d961fc1488a1da99aa6191a756a9 5978 intel-microcode_3.20241112.1ubuntu1_source.buildinfo
Checksums-Sha256:
 cfeab54fb9c55c11059e8024f2c035e79c2d6309e374f1a90d7e9bf3402d289d 1696 intel-microcode_3.20241112.1ubuntu1.dsc
 a0cc34143649e1f4cb110efe2e825d44a0d97acec65cf8e96bec6df8710b9373 7782100 intel-microcode_3.20241112.1ubuntu1.tar.xz
 cb6ce135d9a2291ca7f9160374325186534ec661b400bc8d33a939fc28041c59 5978 intel-microcode_3.20241112.1ubuntu1_source.buildinfo
Files:
 60d195d513c1020dc2aa00497185834a 1696 non-free-firmware/admin standard intel-microcode_3.20241112.1ubuntu1.dsc
 3dee4e3b16b674c9fa16d6082cfa5a27 7782100 non-free-firmware/admin standard intel-microcode_3.20241112.1ubuntu1.tar.xz
 2eb1aedbd53a0fdaf9b2621c60e4b189 5978 non-free-firmware/admin standard intel-microcode_3.20241112.1ubuntu1_source.buildinfo
Original-Maintainer: Henrique de Moraes Holschuh <hmh at debian.org>


More information about the plucky-changes mailing list