diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-17 15:12:32 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-17 15:12:32 +0000 |
commit | 4b09ffd732a971d65498379816cd1e66d7cc2138 (patch) | |
tree | a266e32fa8d340611897c89d6a9340bfa662de34 | |
parent | Merging upstream version 3.20240514.1. (diff) | |
download | intel-microcode-4b09ffd732a971d65498379816cd1e66d7cc2138.tar.xz intel-microcode-4b09ffd732a971d65498379816cd1e66d7cc2138.zip |
Merging debian version 3.20240514.1.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r-- | debian/changelog | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 0a44359..b3747ed 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,46 @@ +intel-microcode (3.20240514.1) unstable; urgency=medium + + * New upstream microcode datafile 20240514 + * Mitigations for INTEL-SA-01051 (CVE-2023-45733) + Hardware logic contains race conditions in some Intel Processors may + allow an authenticated user to potentially enable partial information + disclosure via local access. + * Mitigations for INTEL-SA-01052 (CVE-2023-46103) + Sequence of processor instructions leads to unexpected behavior in + Intel Core Ultra Processors may allow an authenticated user to + potentially enable denial of service via local access. + * Mitigations for INTEL-SA-01036 (CVE-2023-45745, CVE-2023-47855) + Improper input validation in some Intel TDX module software before + version 1.5.05.46.698 may allow a privileged user to potentially enable + escalation of privilege via local access. + * Fix for unspecified functional issues on 4th gen and 5th gen Xeon + Scalable, 12th, 13th and 14th gen Intel Core processors, as well as for + Core i3 N-series processors. + * Updated microcodes: + sig 0x000806f8, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632 + sig 0x000806f7, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0 + sig 0x000806f6, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0 + sig 0x000806f5, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0 + sig 0x000806f4, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0 + sig 0x000806f8, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400 + sig 0x000806f6, pf_mask 0x10, 2024-02-05, rev 0x2c000390 + sig 0x000806f5, pf_mask 0x10, 2024-02-05, rev 0x2c000390 + sig 0x000806f4, pf_mask 0x10, 2024-02-05, rev 0x2c000390 + sig 0x00090672, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256 + sig 0x00090675, pf_mask 0x07, 2023-12-05, rev 0x0035 + sig 0x000b06f2, pf_mask 0x07, 2023-12-05, rev 0x0035 + sig 0x000b06f5, pf_mask 0x07, 2023-12-05, rev 0x0035 + sig 0x000906a3, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208 + sig 0x000906a4, pf_mask 0x80, 2023-12-05, rev 0x0433 + sig 0x000906a4, pf_mask 0x40, 2023-12-07, rev 0x0007, size 119808 + sig 0x000b0671, pf_mask 0x32, 2024-01-25, rev 0x0123, size 215040 + sig 0x000b06e0, pf_mask 0x11, 2023-12-07, rev 0x0017, size 138240 + sig 0x000c06f2, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960 + sig 0x000c06f1, pf_mask 0x87, 2024-02-05, rev 0x21000230 + * source: update symlinks to reflect id of the latest release, 20240514 + + -- Henrique de Moraes Holschuh <hmh@debian.org> Thu, 16 May 2024 21:40:52 -0300 + intel-microcode (3.20240312.1-0.0~progress7.99u1) graograman-backports; urgency=medium * Initial reupload to graograman-backports. |