Source: amd64-microcode
Version: 3.20230719.1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 3.20230414.1
Control: found -1 3.20230719.1~deb12u1  
Control: found -1 3.20191218.1
Control: found -1 3.20230719.1~deb11u1

Hi Henrique,

From
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
we did fortunately covered the 3rd Gen AMD EPYC processors microcode
updates for CVE-2023-20569 already with the previous done update:

amd64-microcode (3.20230719.1) unstable; urgency=high

  * Update package data from linux-firmware 20230625-39-g59fbffa9:
    * Fixes for CVE-2023-20593 "Zenbleed" on AMD Zen2 processors
      (closes: #1041863)
    * New Microcode patches:
      + Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008
    * Updated Microcode patches:
      + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a
      + Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079
      + Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d1
      + Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001234
  * README: update for new release

 -- Henrique de Moraes Holschuh <h...@debian.org>  Mon, 24 Jul 2023 13:07:34 
-0300

(and so in {bookworm,bullseye,buster}-security as well).

There was a microcode followup today as
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=f2eb058afc57348cde66852272d6bf11da1eef8f
which followups for the 4th Gen AMD EPYC processors, Genoa
(Family=0x19 Model=0x11) and Bergamo (Family=0x19 Model=0xa0).

Regards,
Salvatore

Reply via email to