diff --git a/changelog b/changelog index e6eb97c..50af05b 100644 --- a/changelog +++ b/changelog @@ -1,12 +1,122 @@ -2024-09-10: - * New upstream microcode datafile 20240910 +2025-02-11: + * New upstream microcode datafile 20250211 + - Mitigations for INTEL-SA-01166 (CVE-2024-31068) + Improper Finite State Machines (FSMs) in Hardware Logic for some Intel + Processors may allow privileged user to potentially enable denial of + service via local access. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel disclosed + that some 9th Generation Intel Core processor models were already fixed + by a previous microcode update. + - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440, + CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279, + CVE-2024-31157, CVE-2024-28047) + Improper input validation, insufficient granularity of access control, + and improper initialization issues in UEFI firmware for some Intel + processors may allow escalation of privilege, denial of service, or + information disclosure. An UEFI firmware update is needed for complete + mitigation. + - Mitigations for INTEL-SA-01228 (CVE-2024-39355) + Improper handling of physical or environmental conditions in some 13th + and 14th Generation Intel Core Processors may allow an authenticated + user to enable denial of service via local access. An UEFI firmware + update may be required for complete mitigation. + - Mitigations for INTEL-SA-01194 (CVE-2024-37020) + Sequence of processor instructions leads to unexpected behavior in the + Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated + user to potentially enable denial of service via local access. + - Fixes for unspecified functional issues on several processor models + * New microcodes or new extended signatures: + sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952 + sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + * Updated microcodes: + sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032 + sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824 + sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592 + sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232 + sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436 + sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808 + sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472 + sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496 + sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544 + sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240 + sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128 + sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291 + +2024-11-12: + * New upstream microcode datafile 20241112 + - Mitigations for INTEL-SA-01101 (CVE-2024-21853) + Improper Finite State Machines (FSMs) in the Hardware logic in + some 4th and 5th Generation Intel Xeon Processors may allow an + authorized user to potentially enable denial of service via local + access. + - Mitigations for INTEL-SA-01079 (CVE-2024-23918) + Potential security vulnerabilities in some Intel Xeon processors + using Intel SGX may allow escalation of privilege. Intel disclosed + that some processor models were already fixed by a previous microcode + update. + - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968) + Improper finite state machines (FSMs) in hardware logic in some + Intel Processors may allow an privileged user to potentially enable a + denial of service via local access. - Mitigations for INTEL-SA-01103 (CVE-2024-23984) A potential security vulnerability in the Running Average Power Limit (RAPL) interface for some Intel Processors may allow information - disclosure. + disclosure. Added mitigations for more processor models. + * Updated Microcodes: + sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800 + sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256 + sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037 + sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037 + sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037 + sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232 + sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435 + sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240 + sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123 + sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123 + sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128 + sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283 + +2024-10-29: + * New upstream microcode datafile 20241029 + - Fixes errata RPL061: Incorrect Internal Voltage Request May Lead to + Unpredictable System Behavior. This errata could eventually cause + permanent hardware damage to the processor. This fix is only active + when the microcode update is loaded from FIT (i.e. in firmware). + * Updated Microcodes: + sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968 + +2024-09-10: + * New upstream microcode datafile 20240910 - Mitigations for INTEL-SA-01097 (CVE-2024-24968) - A potential security vulnerability in some Intel Processors may allow - denial of service. + Improper finite state machines (FSMs) in hardware logic in some + Intel Processors may allow an privileged user to potentially enable a + denial of service via local access. - Fixes for unspecified functional issues on several processor models - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but @@ -52,6 +162,23 @@ allow an authenticated user to potentially enable escalation of privilege via local access. Intel disclosed that some processor models were already fixed by the previous microcode update. + - Mitigations for INTEL-SA-01079 (CVE-2024-23918) + Potential security vulnerabilities in some Intel Xeon processors + using Intel SGX may allow escalation of privilege. Intel released this + information during the full disclosure for the 20241112 update. + Processor signatures 0x606a6 and 0x606c1. + - Mitigations for INTEL-SA-01103 (CVE-2024-23984) + A potential security vulnerability in the Running Average Power Limit + (RAPL) interface for some Intel Processors may allow information + disclosure. Intel released this information during the full disclosure + for the 20240910 update. Processor signatures 0x5065b, 0x606a6, + 0x606c1. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel released + this information during the full disclosure for the 20250211 update. + Processor signature 0x906ec (9th Generation Intel Core processor). - Fix for unspecified functional issues on several processor models - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a microcode update". It is not clear which processors were fixed by this diff --git a/debian/changelog b/debian/changelog index 4f8a14c..e975883 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,26 +1,139 @@ -intel-microcode (3.20241112.1+0deepin) unstable; urgency=medium - - * New upstream microcode 20241112. - - -- lichenggang Fri, 15 Nov 2024 17:43:59 +0800 - -intel-microcode (3.20241029.1+0deepin) unstable; urgency=medium +intel-microcode (3.20250211.1) unstable; urgency=medium + + * New upstream microcode datafile 20250211 (closes: #1095805) + - Mitigations for INTEL-SA-01166 (CVE-2024-31068) + Improper Finite State Machines (FSMs) in Hardware Logic for some Intel + Processors may allow privileged user to potentially enable denial of + service via local access. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel disclosed + that some 9th Generation Intel Core processor models were already fixed + by a previous microcode update. + - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440, + CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279, + CVE-2024-31157, CVE-2024-28047) + Improper input validation, insufficient granularity of access control, + and improper initialization issues in UEFI firmware for some Intel + processors may allow escalation of privilege, denial of service, or + information disclosure. An UEFI firmware update is needed for complete + mitigation. + - Mitigations for INTEL-SA-01228 (CVE-2024-39355) + Improper handling of physical or environmental conditions in some 13th + and 14th Generation Intel Core Processors may allow an authenticated + user to enable denial of service via local access. An UEFI firmware + update may be required for complete mitigation. + - Mitigations for INTEL-SA-01194 (CVE-2024-37020) + Sequence of processor instructions leads to unexpected behavior in the + Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated + user to potentially enable denial of service via local access. + - Fixes for unspecified functional issues on several processor models + * New microcodes or new extended signatures: + sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952 + sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + * Updated microcodes: + sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032 + sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824 + sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592 + sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232 + sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436 + sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808 + sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472 + sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496 + sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544 + sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240 + sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128 + sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291 + * source: update symlinks to reflect id of the latest release, 20250211 + * Update changelog for 3.20240813.1 with new information - * New upstream microcode 20241029. - * Update for functional issues. Refer to 14th/13th Generation Intel® Core™ Processor Specification Update for details. + -- Henrique de Moraes Holschuh Sun, 16 Feb 2025 18:34:38 -0300 + +intel-microcode (3.20241112.1) unstable; urgency=medium + + * New upstream microcode datafile 20241112 (closes: #1086483) + - Mitigations for INTEL-SA-01101 (CVE-2024-21853) + Improper Finite State Machines (FSMs) in the Hardware logic in some + 4th and 5th Generation Intel Xeon Processors may allow an authorized + user to potentially enable denial of service via local access. + - Mitigations for INTEL-SA-01079 (CVE-2024-23918) + Potential security vulnerabilities in some Intel Xeon processors + using Intel SGX may allow escalation of privilege. Intel disclosed + that some processor models were already fixed by a previous + microcode update. + - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968) + Improper finite state machines (FSMs) in hardware logic in some + Intel Processors may allow an privileged user to potentially enable a + denial of service via local access. + - Mitigations for INTEL-SA-01103 (CVE-2024-23984) + A potential security vulnerability in the Running Average Power Limit + (RAPL) interface for some Intel Processors may allow information + disclosure. Added mitigations for more processor models. + * Updated Microcodes: + sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800 + sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603 + sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256 + sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037 + sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037 + sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037 + sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232 + sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435 + sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240 + sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123 + sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123 + sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128 + sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283 + * source: update symlinks to reflect id of the latest release, 20241112 + * Update changelog for 3.20240910.1 and 3.20240813.1 with new information: + INTEL-SA-1103 was addressed by 3.20240813.1 for some processor models, + and not by 3.20240910. INTEL-SA-1079 was addressed by 3.20240910.1 for + some processor models. + + -- Henrique de Moraes Holschuh Thu, 14 Nov 2024 15:37:40 -0300 + +intel-microcode (3.20241029.1) UNRELEASED; urgency=medium + + * New upstream microcode datafile 20241029 + - Not relevant for operating system microcode updates + - Only when loaded from firmware, this update fixes the critical, + potentially hardware-damaging errata RPL061: Incorrect Internal + Voltage Request on Raptor Lake (Core 13th/14th gen) Intel + processors. + * Updated Microcodes: + sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968 - -- lichenggang Wed, 30 Oct 2024 13:17:41 +0800 + -- Henrique de Moraes Holschuh Thu, 14 Nov 2024 14:49:03 -0300 intel-microcode (3.20240910.1) unstable; urgency=medium * New upstream microcode datafile 20240910 (closes: #1081363) - - Mitigations for INTEL-SA-01103 (CVE-2024-23984) - A potential security vulnerability in the Running Average Power Limit - (RAPL) interface for some Intel Processors may allow information - disclosure. - Mitigations for INTEL-SA-01097 (CVE-2024-24968) - A potential security vulnerability in some Intel Processors may allow - denial of service. + Improper finite state machines (FSMs) in hardware logic in some + Intel Processors may allow an privileged user to potentially enable a + denial of service via local access. - Fixes for unspecified functional issues on several processor models - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but @@ -79,10 +192,27 @@ intel-microcode (3.20240813.1) unstable; urgency=medium allow an authenticated user to potentially enable escalation of privilege via local access. Intel disclosed that some processor models were already fixed by the previous microcode update. + - Mitigations for INTEL-SA-01079 (CVE-2024-23918) + Potential security vulnerabilities in some Intel Xeon processors + using Intel SGX may allow escalation of privilege. Intel released this + information during the full disclosure for the 20241112 update. + Processor signatures 0x606a6 and 0x606c1. + - Mitigations for INTEL-SA-01103 (CVE-2024-23984) + A potential security vulnerability in the Running Average Power Limit + (RAPL) interface for some Intel Processors may allow information + disclosure. Intel released this information during the full disclosure + for the 20240910 update. Processor signatures 0x5065b, 0x606a6, + 0x606c1. - Fix for unspecified functional issues on several processor models - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a microcode update". It is not clear which processors were fixed by this release, or by one of the microcode updates from 2024-05. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel released + this information during the full disclosure for the 20250211 update. + Processor signature 0x906ec (9th Generation Intel Core processor). * Updated microcodes: sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936 sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720 diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06 index 7a2cb68..d4a366f 100644 Binary files a/intel-ucode/06-6a-06 and b/intel-ucode/06-6a-06 differ diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01 index 019a72a..1676c98 100644 Binary files a/intel-ucode/06-6c-01 and b/intel-ucode/06-6c-01 differ diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05 deleted file mode 100644 index 34b14f1..0000000 Binary files a/intel-ucode/06-8f-05 and /dev/null differ diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06 deleted file mode 100644 index 34b14f1..0000000 Binary files a/intel-ucode/06-8f-06 and /dev/null differ diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07 index 803094c..ba8c8fd 100644 Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08 index 34b14f1..7bc6a8f 100644 Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03 index d60fc12..fe20c2c 100644 Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04 index f1f5fc6..0268fc4 100644 Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a index ccbd25f..7eb1a98 100644 Binary files a/intel-ucode/06-9e-0a and b/intel-ucode/06-9e-0a differ diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d index b4916c0..949389d 100644 Binary files a/intel-ucode/06-9e-0d and b/intel-ucode/06-9e-0d differ diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01 index cdd4d65..32eeaac 100644 Binary files a/intel-ucode/06-a7-01 and b/intel-ucode/06-a7-01 differ diff --git a/intel-ucode/06-af-03 b/intel-ucode/06-af-03 new file mode 100644 index 0000000..9629bae Binary files /dev/null and b/intel-ucode/06-af-03 differ diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01 index d57fa9d..a0b16ee 100644 Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02 index 19c9647..7359151 100644 Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03 index 19c9647..7359151 100644 Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08 deleted file mode 100644 index 19c9647..0000000 Binary files a/intel-ucode/06-ba-08 and /dev/null differ diff --git a/intel-ucode/06-be-00 b/intel-ucode/06-be-00 index 5316c7e..2a61c4a 100644 Binary files a/intel-ucode/06-be-00 and b/intel-ucode/06-be-00 differ diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01 index 4f47576..937187a 100644 Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02 index 4f47576..937187a 100644 Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ diff --git a/microcode-20240910.d b/microcode-20250211.d similarity index 100% rename from microcode-20240910.d rename to microcode-20250211.d diff --git a/releasenote.md b/releasenote.md index 1c417fa..300576b 100644 --- a/releasenote.md +++ b/releasenote.md @@ -1,4 +1,66 @@ # Release Notes +## [microcode-20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211) + +### Purpose + +- Security updates for [INTEL-SA-01166](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html) +- Security updates for [INTEL-SA-01213](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html) +- Security updates for [INTEL-SA-01139](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html) +- Security updates for [INTEL-SA-01228](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html) +- Security updates for [INTEL-SA-01194](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html) + +- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details. +- Update for functional issues. Refer to [13th/14th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details. +- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details. +- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details. +- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details. +- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details. +- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details. +- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details. +- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details. +- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details. +- Update for functional issues. Refer to [Intel® Xeon® 6700-Series Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/820922) for details. +- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details + +### New Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| SRF-SP | C0 | 06-af-03/01 | | 03000330 | Xeon 6700-Series Processors with E-Cores + +### Updated Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| ADL | C0 | 06-97-02/07 | 00000037 | 00000038 | Core Gen12 +| ADL | H0 | 06-97-05/07 | 00000037 | 00000038 | Core Gen12 +| ADL | L0 | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12 +| ADL | R0 | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12 +| ADL-N | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E +| AZB | A0/R0 | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100 +| CFL-H | R0 | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile +| CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E +| EMR-SP | A0 | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5 +| EMR-SP | A1 | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5 +| ICL-D | B0 | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx +| ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3 +| RPL-E/HX/S | B0 | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14 +| RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13 +| RPL-HX/S | C0 | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14 +| RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13 +| RPL-S | H0 | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14 +| RKL-S | B0 | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11 +| SPR-HBM | Bx | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max +| SPR-SP | E4/S2 | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 +| SPR-SP | E5/S3 | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 +| TWL | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E + +### New Disclosures Updated in Prior Releases + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| CFL-H/S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 + ## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112) ### Purpose diff --git a/supplementary-ucode-20240910_BDX-ML.bin b/supplementary-ucode-20250211_BDX-ML.bin similarity index 100% rename from supplementary-ucode-20240910_BDX-ML.bin rename to supplementary-ucode-20250211_BDX-ML.bin