Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu

[ Reason ]

As requested by the security team, I would like to bring the microcode
update level for Intel processors in Bookworm to match what we have in Sid
and Trixie.

This fixes:
  - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
  - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
  - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
  - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
  * Other unspecified functional issues on several processors

There are no releavant issues reported on this microcode update,
considering the version of intel-microcode already available as security
updates for Bookworm.

[ Impact ]

If this update is not approved, owners of most recent "client" Intel
processors and a few server processors will depend on UEFI updates to be
protected from the issues listed above.

[ Tests ]

There were no bug reports from users of Debian sid or Trixie, these
packages have been tested there since 2024-11-14 (sid), 2024-11-20
(trixie).

[ Risks ]

Unknown, but not believed to be any different from other Intel microcode
updates.

[ Checklist ]

  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

As per the debdiff, only documentation changes, package documentation
changes, and the binary blob change from upstream.

 changelog            |   66 ++++++++++++++++++++++++++++++++++++---
 debian/changelog     |   86 +++++++++++++++++++++++++++++++++++++++++++++++----
 intel-ucode/06-8f-05 |binary
 intel-ucode/06-8f-06 |binary
 intel-ucode/06-8f-07 |binary
 intel-ucode/06-8f-08 |binary
 intel-ucode/06-97-02 |binary
 intel-ucode/06-97-05 |binary
 intel-ucode/06-9a-03 |binary
 intel-ucode/06-9a-04 |binary
 intel-ucode/06-aa-04 |binary
 intel-ucode/06-b7-01 |binary
 intel-ucode/06-ba-02 |binary
 intel-ucode/06-ba-03 |binary
 intel-ucode/06-ba-08 |binary
 intel-ucode/06-bf-02 |binary
 intel-ucode/06-bf-05 |binary
 intel-ucode/06-cf-01 |binary
 intel-ucode/06-cf-02 |binary
 releasenote.md       |   72 ++++++++++++++++++++++++++++++++++++++++++
 20 files changed, 213 insertions(+), 11 deletions(-)

[ Other info ]

The package version with "~" is needed to guarantee smooth updates to
the next debian release.

-- 
  Henrique Holschuh
diff --git a/changelog b/changelog
index e6eb97c..a611986 100644
--- a/changelog
+++ b/changelog
@@ -1,12 +1,57 @@
-2024-09-10:
-  * New upstream microcode datafile 20240910
+2024-11-12:
+  * New upstream microcode datafile 20241112
+    - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
+      Improper Finite State Machines (FSMs) in the Hardware logic in
+      some 4th and 5th Generation Intel Xeon Processors may allow an
+      authorized user to potentially enable denial of service via local
+      access.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel disclosed
+      that some processor models were already fixed by a previous microcode
+      update.
+    - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
     - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
       A potential security vulnerability in the Running Average Power Limit
       (RAPL) interface for some Intel Processors may allow information
-      disclosure.
+      disclosure.  Added mitigations for more processor models.
+  * Updated Microcodes:
+    sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
+    sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
+    sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
+    sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
+    sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
+
+2024-10-29:
+  * New upstream microcode datafile 20241029
+    - Fixes errata RPL061: Incorrect Internal Voltage Request May Lead to
+      Unpredictable System Behavior.  This errata could eventually cause
+      permanent hardware damage to the processor.  This fix is only active
+      when the microcode update is loaded from FIT (i.e. in firmware).
+  * Updated Microcodes:
+    sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
+
+2024-09-10:
+  * New upstream microcode datafile 20240910
     - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
-      A potential security vulnerability in some Intel Processors may allow
-      denial of service.
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
     - Fixes for unspecified functional issues on several processor models
     - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
       FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
@@ -52,6 +97,17 @@
       allow an authenticated user to potentially enable escalation of
       privilege via local access.  Intel disclosed that some processor models
       were already fixed by the previous microcode update.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel released this
+      information during the full disclosure for the 20241112 update.
+      Processor signatures 0x606a6 and 0x606c1.
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure.  Intel released this information during the full disclosure
+      for the 20240910 update.  Processor signatures 0x5065b, 0x606a6,
+      0x606c1.
     - Fix for unspecified functional issues on several processor models
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
diff --git a/debian/changelog b/debian/changelog
index 5e6276e..3d0dc0d 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,69 @@
+intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium
+
+  * Build for bookworm
+  * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sat, 07 Dec 2024 14:49:05 -0300
+
+intel-microcode (3.20241112.1) unstable; urgency=medium
+
+  * New upstream microcode datafile 20241112 (closes: #1086483)
+    - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
+      Improper Finite State Machines (FSMs) in the Hardware logic in some
+      4th and 5th Generation Intel Xeon Processors may allow an authorized
+      user to potentially enable denial of service via local access.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel disclosed
+      that some processor models were already fixed by a previous
+      microcode update.
+    - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure.  Added mitigations for more processor models.
+  * Updated Microcodes:
+    sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
+    sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
+    sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
+    sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
+    sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
+  * source: update symlinks to reflect id of the latest release, 20241112
+  * Update changelog for 3.20240910.1 and 3.20240813.1 with new information:
+    INTEL-SA-1103 was addressed by 3.20240813.1 for some processor models,
+    and not by 3.20240910. INTEL-SA-1079 was addressed by 3.20240910.1 for
+    some processor models.
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Thu, 14 Nov 2024 15:37:40 -0300
+
+intel-microcode (3.20241029.1) UNRELEASED; urgency=medium
+
+  * New upstream microcode datafile 20241029
+    - Not relevant for operating system microcode updates
+    - Only when loaded from firmware, this update fixes the critical,
+      potentially hardware-damaging errata RPL061: Incorrect Internal
+      Voltage Request on Raptor Lake (Core 13th/14th gen) Intel
+      processors.
+  * Updated Microcodes:
+    sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Thu, 14 Nov 2024 14:49:03 -0300
+
 intel-microcode (3.20240910.1~deb12u1) bookworm; urgency=medium
 
   * Build for bookworm
@@ -8,13 +74,10 @@ intel-microcode (3.20240910.1~deb12u1) bookworm; urgency=medium
 intel-microcode (3.20240910.1) unstable; urgency=medium
 
   * New upstream microcode datafile 20240910 (closes: #1081363)
-    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
-      A potential security vulnerability in the Running Average Power Limit
-      (RAPL) interface for some Intel Processors may allow information
-      disclosure.
     - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
-      A potential security vulnerability in some Intel Processors may allow
-      denial of service.
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
     - Fixes for unspecified functional issues on several processor models
     - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
       FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
@@ -72,6 +135,17 @@ intel-microcode (3.20240813.1) unstable; urgency=medium
       allow an authenticated user to potentially enable escalation of
       privilege via local access.  Intel disclosed that some processor models
       were already fixed by the previous microcode update.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel released this
+      information during the full disclosure for the 20241112 update.
+      Processor signatures 0x606a6 and 0x606c1.
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure. Intel released this information during the full disclosure
+      for the 20240910 update.  Processor signatures 0x5065b, 0x606a6,
+      0x606c1.
     - Fix for unspecified functional issues on several processor models
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-05 and b/intel-ucode/06-8f-05 differ
diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-06 and b/intel-ucode/06-8f-06 differ
diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07
index d629737..803094c 100644
Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ
diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ
diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ
diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ
diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03
index ac46000..d60fc12 100644
Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ
diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04
index 5630a87..f1f5fc6 100644
Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ
diff --git a/intel-ucode/06-aa-04 b/intel-ucode/06-aa-04
index f7ce6aa..267b835 100644
Binary files a/intel-ucode/06-aa-04 and b/intel-ucode/06-aa-04 differ
diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01
index ed73396..d57fa9d 100644
Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ
diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ
diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ
diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-08 and b/intel-ucode/06-ba-08 differ
diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ
diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ
diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01
index 85ed301..4f47576 100644
Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ
diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02
index 85ed301..4f47576 100644
Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ
diff --git a/microcode-20240910.d b/microcode-20241112.d
similarity index 100%
rename from microcode-20240910.d
rename to microcode-20241112.d
diff --git a/releasenote.md b/releasenote.md
index f00475e..1c417fa 100644
--- a/releasenote.md
+++ b/releasenote.md
@@ -1,3 +1,75 @@
+# Release Notes
+## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01101](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html)
+- Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html)
+- Updated security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html)
+- Updated security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html)
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [14th/13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
+- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-1700 and D-1800 Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714069) for details
+
+
+### New Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL            | C0       | 06-97-02/07 | 00000036 | 00000037 | Core Gen12
+| ADL            | H0       | 06-97-05/07 | 00000036 | 00000037 | Core Gen12
+| ADL            | L0       | 06-9a-03/80 | 00000434 | 00000435 | Core Gen12
+| ADL            | R0       | 06-9a-04/80 | 00000434 | 00000435 | Core Gen12
+| EMR-SP         | A0       | 06-cf-01/87 | 21000230 | 21000283 | Xeon Scalable Gen5
+| EMR-SP         | A1       | 06-cf-02/87 | 21000230 | 21000283 | Xeon Scalable Gen5
+| MTL            | C0       | 06-aa-04/e6 | 0000001f | 00000020 | Core™ Ultra Processor
+| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004122 | 00004123 | Core Gen13
+| RPL-HX/S       | C0       | 06-bf-02/07 | 00000036 | 00000037 | Core Gen13/Gen14
+| RPL-S          | H0       | 06-bf-05/07 | 00000036 | 00000037 | Core Gen13/Gen14
+| RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004122 | 00004123 | Core Gen13
+| SPR-SP         | E3       | 06-8f-06/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+| SPR-SP         | E4/S2    | 06-8f-07/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+| SPR-SP         | E5/S3    | 06-8f-08/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+
+### New Disclosures Updated in Prior Releases
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ICL-D          | B0       | 06-6c-01/10 | 010002b0 | N/A      | Xeon D-17xx/D-18xx, D-27xx/D-28xx
+| ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | N/A      | Xeon Scalable Gen3
+
+
+# Release Notes
+## [microcode-20241029](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029)
+
+### Purpose
+
+- Update for functional issues. Refer to [14th/13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+
+### New Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| RPL-E/HX/S     | B0       | 06-b7-01/32 | 00000129 | 0000012b | Core Gen13/Gen14
+
+
 # Release Notes
 ## [microcode-20240910](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)
 
diff --git a/supplementary-ucode-20240910_BDX-ML.bin b/supplementary-ucode-20241112_BDX-ML.bin
similarity index 100%
rename from supplementary-ucode-20240910_BDX-ML.bin
rename to supplementary-ucode-20241112_BDX-ML.bin

Attachment: signature.asc
Description: PGP signature

Reply via email to