[ubuntu/questing-proposed] amd64-microcode 3.20250708.1ubuntu1 (Accepted)
Rodrigo Figueiredo Zaiden
rodrigo.zaiden at canonical.com
Tue Aug 19 18:57:14 UTC 2025
amd64-microcode (3.20250708.1ubuntu1) questing; urgency=medium
[ Rodrigo Figueiredo Zaiden ]
* SECURITY UPDATE: Update package data from linux-firmware 20250708 (LP: #2120893)
- Updated microcodes:
Family=0x19 Model=0x08 Stepping=0x02: Patch=0x0a00820d Length=5568 bytes
Family=0x19 Model=0x18 Stepping=0x01: Patch=0x0a108109 Length=5568 bytes
Family=0x19 Model=0x21 Stepping=0x00: Patch=0x0a20102e Length=5568 bytes
Family=0x19 Model=0x21 Stepping=0x02: Patch=0x0a201211 Length=5568 bytes
Family=0x19 Model=0x44 Stepping=0x01: Patch=0x0a404108 Length=5568 bytes
Family=0x19 Model=0x50 Stepping=0x00: Patch=0x0a500012 Length=5568 bytes
Family=0x19 Model=0x61 Stepping=0x02: Patch=0x0a60120a Length=5568 bytes
Family=0x19 Model=0x74 Stepping=0x01: Patch=0x0a704108 Length=5568 bytes
Family=0x19 Model=0x75 Stepping=0x02: Patch=0x0a705208 Length=5568 bytes
Family=0x19 Model=0x78 Stepping=0x00: Patch=0x0a708008 Length=5568 bytes
Family=0x19 Model=0x7c Stepping=0x00: Patch=0x0a70c008 Length=5568 bytes
- CVE-2024-36350 (AMD-SB-7029)
A transient execution vulnerability in some AMD processors may allow
an attacker to infer data from previous stores, potentially resulting
in the leakage of privileged information.
- CVE-2024-36357 (AMD-SB-7029)
A transient execution vulnerability in some AMD processors may allow
an attacker to infer data in the L1D cache, potentially resulting in
the leakage of sensitive information across privileged boundaries.
* Remaining changes:
- initramfs-tools hook (debian/initramfs.hook):
+ Default to 'early' instead of 'auto' when building with
MODULES=most
+ Do not override preset defaults from auto-exported conf
snippets loaded by initramfs-tools.
[ Marc Deslauriers ]
* Also Update AMD PMF TA Firmware to v3.1 to match the upstream git tag.
Date: Mon, 18 Aug 2025 22:08:22 -0300
Changed-By: Rodrigo Figueiredo Zaiden <rodrigo.zaiden at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/amd64-microcode/3.20250708.1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Mon, 18 Aug 2025 22:08:22 -0300
Source: amd64-microcode
Built-For-Profiles: noudeb
Architecture: source
Version: 3.20250708.1ubuntu1
Distribution: questing
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Rodrigo Figueiredo Zaiden <rodrigo.zaiden at canonical.com>
Launchpad-Bugs-Fixed: 2120893
Changes:
amd64-microcode (3.20250708.1ubuntu1) questing; urgency=medium
.
[ Rodrigo Figueiredo Zaiden ]
* SECURITY UPDATE: Update package data from linux-firmware 20250708 (LP: #2120893)
- Updated microcodes:
Family=0x19 Model=0x08 Stepping=0x02: Patch=0x0a00820d Length=5568 bytes
Family=0x19 Model=0x18 Stepping=0x01: Patch=0x0a108109 Length=5568 bytes
Family=0x19 Model=0x21 Stepping=0x00: Patch=0x0a20102e Length=5568 bytes
Family=0x19 Model=0x21 Stepping=0x02: Patch=0x0a201211 Length=5568 bytes
Family=0x19 Model=0x44 Stepping=0x01: Patch=0x0a404108 Length=5568 bytes
Family=0x19 Model=0x50 Stepping=0x00: Patch=0x0a500012 Length=5568 bytes
Family=0x19 Model=0x61 Stepping=0x02: Patch=0x0a60120a Length=5568 bytes
Family=0x19 Model=0x74 Stepping=0x01: Patch=0x0a704108 Length=5568 bytes
Family=0x19 Model=0x75 Stepping=0x02: Patch=0x0a705208 Length=5568 bytes
Family=0x19 Model=0x78 Stepping=0x00: Patch=0x0a708008 Length=5568 bytes
Family=0x19 Model=0x7c Stepping=0x00: Patch=0x0a70c008 Length=5568 bytes
- CVE-2024-36350 (AMD-SB-7029)
A transient execution vulnerability in some AMD processors may allow
an attacker to infer data from previous stores, potentially resulting
in the leakage of privileged information.
- CVE-2024-36357 (AMD-SB-7029)
A transient execution vulnerability in some AMD processors may allow
an attacker to infer data in the L1D cache, potentially resulting in
the leakage of sensitive information across privileged boundaries.
* Remaining changes:
- initramfs-tools hook (debian/initramfs.hook):
+ Default to 'early' instead of 'auto' when building with
MODULES=most
+ Do not override preset defaults from auto-exported conf
snippets loaded by initramfs-tools.
.
[ Marc Deslauriers ]
* Also Update AMD PMF TA Firmware to v3.1 to match the upstream git tag.
Checksums-Sha1:
4f703bc44e72c345c8e43e8af99b0936c7b12b46 1802 amd64-microcode_3.20250708.1ubuntu1.dsc
53a56dcd1e3e36a46c44f1b507f6015cfe75afee 296544 amd64-microcode_3.20250708.1ubuntu1.tar.xz
6743e785177bd72d6348101e969e5ed904d18b51 6319 amd64-microcode_3.20250708.1ubuntu1_source.buildinfo
Checksums-Sha256:
4a4e9ff1615adb0dfd9af30735af1e596440835cb574be1035889cbb20f11398 1802 amd64-microcode_3.20250708.1ubuntu1.dsc
3b49770da37d3bb58b43eaefaf072addf90d5b42a35c7c025cf17075db11a135 296544 amd64-microcode_3.20250708.1ubuntu1.tar.xz
4b2707b524db152852de91aa74792e2d322734a851fbdc2715068b205f6cd14d 6319 amd64-microcode_3.20250708.1ubuntu1_source.buildinfo
Files:
914ed046b98ac310a4dfa91cd16eda29 1802 non-free-firmware/admin standard amd64-microcode_3.20250708.1ubuntu1.dsc
5993df8fbc7c7b6989eb908266360653 296544 non-free-firmware/admin standard amd64-microcode_3.20250708.1ubuntu1.tar.xz
d3e987a0c9a8d44db28c523d96b7a412 6319 non-free-firmware/admin standard amd64-microcode_3.20250708.1ubuntu1_source.buildinfo
Original-Maintainer: Henrique de Moraes Holschuh <hmh at debian.org>
More information about the Questing-changes
mailing list