-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 20 Jun 2025 11:36:35 -0300 Source: amd64-microcode Architecture: source Version: 3.20250311.1~deb12u1 Distribution: bookworm Urgency: medium Maintainer: Henrique de Moraes Holschuh Changed-By: Henrique de Moraes Holschuh Closes: 1095470 Changes: amd64-microcode (3.20250311.1~deb12u1) bookworm; urgency=medium . * Rebuild for bookworm (revert merged-usr changes from unstable) . amd64-microcode (3.20250311.1) unstable; urgency=medium . * Update package data from linux-firmware 20250311 * New AMD-SEV firmware from AMD upstream (20250221) * SECURITY UPDATE (AMD-SB-3019 / CVE-2024-56161): Update remote attestation to be compatible with AMD systems with up-to-date firmware (i.e. which fixes "EntrySign"), and update AMD-SEV for AMD-SB-3019 mitigations. Note that this AMD-SEV update DOES NOT FIX the microcode "EntrySign" vulnerability. (closes: #1095470) + Updated SEV firmware: Family 17h models 30h-3fh: version 0.24 build 20 Family 19h models 00h-0fh: version 1.55 build 29 Family 19h models 10h-1fh: version 1.55 build 39 Family 19h models a0h-afh: version 1.55 build 39 + New SEV firmware: Family 1ah models 00h-0fh: version 1.55 build 54 * New AMD microcode updates from AMD upstream (20241121) + Add patches for many (non-server) family 19h processors * Updated Microcode patches: + Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a0000a * New Microcode patches: + Family=0x17 Model=0x60 Stepping=0x01: Patch=0x0860010d + Family=0x17 Model=0x68 Stepping=0x01: Patch=0x08608108 + Family=0x17 Model=0x71 Stepping=0x00: Patch=0x08701034 + Family=0x19 Model=0x08 Stepping=0x02: Patch=0x0a00820c + Family=0x19 Model=0x18 Stepping=0x01: Patch=0x0a108108 + Family=0x19 Model=0x21 Stepping=0x00: Patch=0x0a20102d + Family=0x19 Model=0x21 Stepping=0x02: Patch=0x0a201210 + Family=0x19 Model=0x44 Stepping=0x01: Patch=0x0a404107 + Family=0x19 Model=0x50 Stepping=0x00: Patch=0x0a500011 + Family=0x19 Model=0x61 Stepping=0x02: Patch=0x0a601209 + Family=0x19 Model=0x74 Stepping=0x01: Patch=0x0a704107 + Family=0x19 Model=0x75 Stepping=0x02: Patch=0x0a705206 + Family=0x19 Model=0x78 Stepping=0x00: Patch=0x0a708007 + Family=0x19 Model=0x7c Stepping=0x00: Patch=0x0a70c005 Checksums-Sha1: a65f75dee9ee1069927c50347a0f0a48fce37ccd 1727 amd64-microcode_3.20250311.1~deb12u1.dsc 159e6cea59289b40488aa8b8b2ad518530c93a13 282888 amd64-microcode_3.20250311.1~deb12u1.tar.xz 01b8b2292f36d78e10e2f0f0dc0d4db61b0d6167 6355 amd64-microcode_3.20250311.1~deb12u1_amd64.buildinfo Checksums-Sha256: 132a3e5e51fb8914e1751363938c67727513253062de7a4475ef54fbd1886ccf 1727 amd64-microcode_3.20250311.1~deb12u1.dsc 339072905ad809c3fe0371ccb1d62b590586a28142e3438842675d811b94fd95 282888 amd64-microcode_3.20250311.1~deb12u1.tar.xz 5a36acb23faf85afc415d789f978f9f18554eaefbfd612471ce1e8b50f04825e 6355 amd64-microcode_3.20250311.1~deb12u1_amd64.buildinfo Files: 397a07cc377bcdfac5818e766129fe98 1727 non-free-firmware/admin standard amd64-microcode_3.20250311.1~deb12u1.dsc 3fe5156911773c35d50bc742b8d99bbf 282888 non-free-firmware/admin standard amd64-microcode_3.20250311.1~deb12u1.tar.xz 5347948f9640f55f042007c95c83cfda 6355 non-free-firmware/admin standard amd64-microcode_3.20250311.1~deb12u1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpvbMGUAhfu+gsYOwlOXoPKamj0cFAmhVdEMACgkQlOXoPKam j0epAA//REYnziwso3f6ExK/M/qQp9G/ABd4+YTficxX18KhhVd/KmEDt8uixQOe Ed8ehD+d1K+w89000gtepULrK53PdhoywSPsKjMw6U1KDFmZboW67vnqs+enMNRs y8XDQ6xjvxukdj1BqlhhpsT35coDhueumWaeZ0pEzX/7klb423UGOsdHjeSPZw79 9pCfJc+JOxWWl8qvqflhag0XZ8nuATPPEOWpdqMQ0bQM/11z7LBFx3FTgzpexqrF MPEWornrCd/wPc+sLzD3WaEUM0WW7KuqHFy7EKcWTCMnNMCfES3E042eJKTQ28Mw BBgmT5q/tzhd97/JMtI0HEcaXLIyl64ihn2VQ2e5bmo3qSSpZCs+H1OtDnHxXuj8 FQTHlOSHASvUCYCfEouanEUs6mgrigvHvXKwlRBEJCguYV8V51vv7XqaisC5Pbbk VaWaw7AdXKpMgybBtSzHX+FXbU++wZO4sZbq2jJzcYKnRTao/ZmTv3f8jfyyHCC3 qZbNRujuCxVj+xOmPrxDbPPoj+sS78Ymm/SM6nG2rvLbt0b8oarB2j5aCNdDnu3o 8GgjYFRKdgzTmcNjl4HZ7xSrbCkTNSDFala7DXLPimIWE7jrtM/XnzCjGGrw1bvV 4AGw6UaKa+tmSAEcyaA1+CrW8AdhrpGJKyKBx7U/uIP0TbqZUN8= =Y24v -----END PGP SIGNATURE-----