--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu
[ Reason ]
As requested by the security team, I would like to bring the microcode
update level for Intel processors in Bookworm to match what we have in Sid
and Trixie.
This fixes:
- Mitigations for INTEL-SA-01101 (CVE-2024-21853)
- Mitigations for INTEL-SA-01079 (CVE-2024-23918)
- Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
- Mitigations for INTEL-SA-01103 (CVE-2024-23984)
* Other unspecified functional issues on several processors
There are no releavant issues reported on this microcode update,
considering the version of intel-microcode already available as security
updates for Bookworm.
[ Impact ]
If this update is not approved, owners of most recent "client" Intel
processors and a few server processors will depend on UEFI updates to be
protected from the issues listed above.
[ Tests ]
There were no bug reports from users of Debian sid or Trixie, these
packages have been tested there since 2024-11-14 (sid), 2024-11-20
(trixie).
[ Risks ]
Unknown, but not believed to be any different from other Intel microcode
updates.
[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable
[ Changes ]
As per the debdiff, only documentation changes, package documentation
changes, and the binary blob change from upstream.
changelog | 66 ++++++++++++++++++++++++++++++++++++---
debian/changelog | 86 +++++++++++++++++++++++++++++++++++++++++++++++----
intel-ucode/06-8f-05 |binary
intel-ucode/06-8f-06 |binary
intel-ucode/06-8f-07 |binary
intel-ucode/06-8f-08 |binary
intel-ucode/06-97-02 |binary
intel-ucode/06-97-05 |binary
intel-ucode/06-9a-03 |binary
intel-ucode/06-9a-04 |binary
intel-ucode/06-aa-04 |binary
intel-ucode/06-b7-01 |binary
intel-ucode/06-ba-02 |binary
intel-ucode/06-ba-03 |binary
intel-ucode/06-ba-08 |binary
intel-ucode/06-bf-02 |binary
intel-ucode/06-bf-05 |binary
intel-ucode/06-cf-01 |binary
intel-ucode/06-cf-02 |binary
releasenote.md | 72 ++++++++++++++++++++++++++++++++++++++++++
20 files changed, 213 insertions(+), 11 deletions(-)
[ Other info ]
The package version with "~" is needed to guarantee smooth updates to
the next debian release.
--
Henrique Holschuh
diff --git a/changelog b/changelog
index e6eb97c..a611986 100644
--- a/changelog
+++ b/changelog
@@ -1,12 +1,57 @@
-2024-09-10:
- * New upstream microcode datafile 20240910
+2024-11-12:
+ * New upstream microcode datafile 20241112
+ - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
+ Improper Finite State Machines (FSMs) in the Hardware logic in
+ some 4th and 5th Generation Intel Xeon Processors may allow an
+ authorized user to potentially enable denial of service via local
+ access.
+ - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+ Potential security vulnerabilities in some Intel Xeon processors
+ using Intel SGX may allow escalation of privilege. Intel disclosed
+ that some processor models were already fixed by a previous microcode
+ update.
+ - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
+ Improper finite state machines (FSMs) in hardware logic in some
+ Intel Processors may allow an privileged user to potentially enable a
+ denial of service via local access.
- Mitigations for INTEL-SA-01103 (CVE-2024-23984)
A potential security vulnerability in the Running Average Power Limit
(RAPL) interface for some Intel Processors may allow information
- disclosure.
+ disclosure. Added mitigations for more processor models.
+ * Updated Microcodes:
+ sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
+ sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
+ sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
+ sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
+ sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
+ sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
+ sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
+ sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
+ sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
+ sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
+ sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
+ sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
+ sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
+
+2024-10-29:
+ * New upstream microcode datafile 20241029
+ - Fixes errata RPL061: Incorrect Internal Voltage Request May Lead to
+ Unpredictable System Behavior. This errata could eventually cause
+ permanent hardware damage to the processor. This fix is only active
+ when the microcode update is loaded from FIT (i.e. in firmware).
+ * Updated Microcodes:
+ sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
+
+2024-09-10:
+ * New upstream microcode datafile 20240910
- Mitigations for INTEL-SA-01097 (CVE-2024-24968)
- A potential security vulnerability in some Intel Processors may allow
- denial of service.
+ Improper finite state machines (FSMs) in hardware logic in some
+ Intel Processors may allow an privileged user to potentially enable a
+ denial of service via local access.
- Fixes for unspecified functional issues on several processor models
- The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but
@@ -52,6 +97,17 @@
allow an authenticated user to potentially enable escalation of
privilege via local access. Intel disclosed that some processor models
were already fixed by the previous microcode update.
+ - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+ Potential security vulnerabilities in some Intel Xeon processors
+ using Intel SGX may allow escalation of privilege. Intel released this
+ information during the full disclosure for the 20241112 update.
+ Processor signatures 0x606a6 and 0x606c1.
+ - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+ A potential security vulnerability in the Running Average Power Limit
+ (RAPL) interface for some Intel Processors may allow information
+ disclosure. Intel released this information during the full disclosure
+ for the 20240910 update. Processor signatures 0x5065b, 0x606a6,
+ 0x606c1.
- Fix for unspecified functional issues on several processor models
- Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
microcode update". It is not clear which processors were fixed by this
diff --git a/debian/changelog b/debian/changelog
index 5e6276e..3d0dc0d 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,69 @@
+intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium
+
+ * Build for bookworm
+ * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+ -- Henrique de Moraes Holschuh <h...@debian.org> Sat, 07 Dec 2024 14:49:05 -0300
+
+intel-microcode (3.20241112.1) unstable; urgency=medium
+
+ * New upstream microcode datafile 20241112 (closes: #1086483)
+ - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
+ Improper Finite State Machines (FSMs) in the Hardware logic in some
+ 4th and 5th Generation Intel Xeon Processors may allow an authorized
+ user to potentially enable denial of service via local access.
+ - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+ Potential security vulnerabilities in some Intel Xeon processors
+ using Intel SGX may allow escalation of privilege. Intel disclosed
+ that some processor models were already fixed by a previous
+ microcode update.
+ - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
+ Improper finite state machines (FSMs) in hardware logic in some
+ Intel Processors may allow an privileged user to potentially enable a
+ denial of service via local access.
+ - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+ A potential security vulnerability in the Running Average Power Limit
+ (RAPL) interface for some Intel Processors may allow information
+ disclosure. Added mitigations for more processor models.
+ * Updated Microcodes:
+ sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
+ sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+ sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
+ sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
+ sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
+ sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
+ sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
+ sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
+ sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
+ sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
+ sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
+ sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
+ sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
+ sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
+ * source: update symlinks to reflect id of the latest release, 20241112
+ * Update changelog for 3.20240910.1 and 3.20240813.1 with new information:
+ INTEL-SA-1103 was addressed by 3.20240813.1 for some processor models,
+ and not by 3.20240910. INTEL-SA-1079 was addressed by 3.20240910.1 for
+ some processor models.
+
+ -- Henrique de Moraes Holschuh <h...@debian.org> Thu, 14 Nov 2024 15:37:40 -0300
+
+intel-microcode (3.20241029.1) UNRELEASED; urgency=medium
+
+ * New upstream microcode datafile 20241029
+ - Not relevant for operating system microcode updates
+ - Only when loaded from firmware, this update fixes the critical,
+ potentially hardware-damaging errata RPL061: Incorrect Internal
+ Voltage Request on Raptor Lake (Core 13th/14th gen) Intel
+ processors.
+ * Updated Microcodes:
+ sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
+
+ -- Henrique de Moraes Holschuh <h...@debian.org> Thu, 14 Nov 2024 14:49:03 -0300
+
intel-microcode (3.20240910.1~deb12u1) bookworm; urgency=medium
* Build for bookworm
@@ -8,13 +74,10 @@ intel-microcode (3.20240910.1~deb12u1) bookworm; urgency=medium
intel-microcode (3.20240910.1) unstable; urgency=medium
* New upstream microcode datafile 20240910 (closes: #1081363)
- - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
- A potential security vulnerability in the Running Average Power Limit
- (RAPL) interface for some Intel Processors may allow information
- disclosure.
- Mitigations for INTEL-SA-01097 (CVE-2024-24968)
- A potential security vulnerability in some Intel Processors may allow
- denial of service.
+ Improper finite state machines (FSMs) in hardware logic in some
+ Intel Processors may allow an privileged user to potentially enable a
+ denial of service via local access.
- Fixes for unspecified functional issues on several processor models
- The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but
@@ -72,6 +135,17 @@ intel-microcode (3.20240813.1) unstable; urgency=medium
allow an authenticated user to potentially enable escalation of
privilege via local access. Intel disclosed that some processor models
were already fixed by the previous microcode update.
+ - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+ Potential security vulnerabilities in some Intel Xeon processors
+ using Intel SGX may allow escalation of privilege. Intel released this
+ information during the full disclosure for the 20241112 update.
+ Processor signatures 0x606a6 and 0x606c1.
+ - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+ A potential security vulnerability in the Running Average Power Limit
+ (RAPL) interface for some Intel Processors may allow information
+ disclosure. Intel released this information during the full disclosure
+ for the 20240910 update. Processor signatures 0x5065b, 0x606a6,
+ 0x606c1.
- Fix for unspecified functional issues on several processor models
- Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
microcode update". It is not clear which processors were fixed by this
diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-05 and b/intel-ucode/06-8f-05 differ
diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-06 and b/intel-ucode/06-8f-06 differ
diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07
index d629737..803094c 100644
Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ
diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ
diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ
diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ
diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03
index ac46000..d60fc12 100644
Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ
diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04
index 5630a87..f1f5fc6 100644
Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ
diff --git a/intel-ucode/06-aa-04 b/intel-ucode/06-aa-04
index f7ce6aa..267b835 100644
Binary files a/intel-ucode/06-aa-04 and b/intel-ucode/06-aa-04 differ
diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01
index ed73396..d57fa9d 100644
Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ
diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ
diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ
diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-08 and b/intel-ucode/06-ba-08 differ
diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ
diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ
diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01
index 85ed301..4f47576 100644
Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ
diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02
index 85ed301..4f47576 100644
Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ
diff --git a/microcode-20240910.d b/microcode-20241112.d
similarity index 100%
rename from microcode-20240910.d
rename to microcode-20241112.d
diff --git a/releasenote.md b/releasenote.md
index f00475e..1c417fa 100644
--- a/releasenote.md
+++ b/releasenote.md
@@ -1,3 +1,75 @@
+# Release Notes
+## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01101](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html)
+- Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html)
+- Updated security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html)
+- Updated security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html)
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [14th/13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
+- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-1700 and D-1800 Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714069) for details
+
+
+### New Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL | C0 | 06-97-02/07 | 00000036 | 00000037 | Core Gen12
+| ADL | H0 | 06-97-05/07 | 00000036 | 00000037 | Core Gen12
+| ADL | L0 | 06-9a-03/80 | 00000434 | 00000435 | Core Gen12
+| ADL | R0 | 06-9a-04/80 | 00000434 | 00000435 | Core Gen12
+| EMR-SP | A0 | 06-cf-01/87 | 21000230 | 21000283 | Xeon Scalable Gen5
+| EMR-SP | A1 | 06-cf-02/87 | 21000230 | 21000283 | Xeon Scalable Gen5
+| MTL | C0 | 06-aa-04/e6 | 0000001f | 00000020 | Core™ Ultra Processor
+| RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004122 | 00004123 | Core Gen13
+| RPL-HX/S | C0 | 06-bf-02/07 | 00000036 | 00000037 | Core Gen13/Gen14
+| RPL-S | H0 | 06-bf-05/07 | 00000036 | 00000037 | Core Gen13/Gen14
+| RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004122 | 00004123 | Core Gen13
+| SPR-SP | E3 | 06-8f-06/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+| SPR-SP | E4/S2 | 06-8f-07/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+| SPR-SP | E5/S3 | 06-8f-08/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+
+### New Disclosures Updated in Prior Releases
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ICL-D | B0 | 06-6c-01/10 | 010002b0 | N/A | Xeon D-17xx/D-18xx, D-27xx/D-28xx
+| ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003e7 | N/A | Xeon Scalable Gen3
+
+
+# Release Notes
+## [microcode-20241029](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029)
+
+### Purpose
+
+- Update for functional issues. Refer to [14th/13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+
+### New Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| RPL-E/HX/S | B0 | 06-b7-01/32 | 00000129 | 0000012b | Core Gen13/Gen14
+
+
# Release Notes
## [microcode-20240910](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)
diff --git a/supplementary-ucode-20240910_BDX-ML.bin b/supplementary-ucode-20241112_BDX-ML.bin
similarity index 100%
rename from supplementary-ucode-20240910_BDX-ML.bin
rename to supplementary-ucode-20241112_BDX-ML.bin
signature.asc
Description: PGP signature
--- End Message ---