Source: amd64-microcode Version: 3.20230719.1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 3.20230414.1 Control: found -1 3.20230719.1~deb12u1 Control: found -1 3.20191218.1 Control: found -1 3.20230719.1~deb11u1
Hi Henrique, From https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html we did fortunately covered the 3rd Gen AMD EPYC processors microcode updates for CVE-2023-20569 already with the previous done update: amd64-microcode (3.20230719.1) unstable; urgency=high * Update package data from linux-firmware 20230625-39-g59fbffa9: * Fixes for CVE-2023-20593 "Zenbleed" on AMD Zen2 processors (closes: #1041863) * New Microcode patches: + Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008 * Updated Microcode patches: + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079 + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d1 + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001234 * README: update for new release -- Henrique de Moraes Holschuh <h...@debian.org> Mon, 24 Jul 2023 13:07:34 -0300 (and so in {bookworm,bullseye,buster}-security as well). There was a microcode followup today as https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=f2eb058afc57348cde66852272d6bf11da1eef8f which followups for the 4th Gen AMD EPYC processors, Genoa (Family=0x19 Model=0x11) and Bergamo (Family=0x19 Model=0xa0). Regards, Salvatore