Package: release.debian.org Severity: normal Tags: bookworm User: release.debian....@packages.debian.org Usertags: pu
[ Reason ] As requested by the security team, I would like to bring the microcode update level for Intel processors in Bullseye and Bookworm to match what we have in Sid and Trixie. This is the bug report for Bookworm, a separate one will be filled for Bullseye. Release 3.20240813.2 currently in Sid/Trixe is entirely made of changes that are only for Sid/Trixie (merged-usr, basically), so I am backporting 3.20240813.1 to Bookworm and Bullseye, instead. This microcode update has important security updates: - Mitigations for INTEL-SA-01083 (CVE-2024-24853) Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel Processors may allow a privileged user to potentially enable escalation of privilege via local access. - Mitigations for INTEL-SA-01118 (CVE-2024-25939) Mirrored regions with different values in 3rd Generation Intel Xeon Scalable Processors may allow a privileged user to potentially enable denial of service via local access. - Mitigations for INTEL-SA-01100 (CVE-2024-24980) Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel Xeon Processors may allow a privileged user to potentially enable escalation of privilege via local access. - Mitigations for INTEL-SA-01038 (CVE-2023-42667) Improper isolation in the Intel Core Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. - Mitigations for INTEL-SA-01046 (CVE-2023-49141) Improper isolation in some Intel® Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. It also fixes some relevant functional issues, including "possible processor hang during microcode updates" on some processors, and (hopefully extremely rare) undefined behavior on some processors. There are no releavant issues reported on this microcode update, considering the version of intel-microcode already available for bookworm and bullseye. [ Impact ] If this update is not approved, owners of most recent Intel processors will depend on UEFI updates to be protected against the security issues above, as well as the other functional issues that were addressed by the microcode update. [ Tests ] It was tested to generate a proper initramfs (new dpkg-trigger functionality which was also tested in unstable and by amd64-microcode). There are no reported regressions from users either in Debian or upstream, and in fact there are several reports upstream that this microcode update fixes issues on specific systems that were present [for a long time] in previous microcode updates. [ Risks ] It looks like this update has a lower risk than usual given the reports upstream of it actually working where several past ones did not, but all microcode updates have some regression risk. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Changes ] * Direct calls to "update-initramfs -u" where replaced with the equivalent of: dpkg-trigger --no-await update-initramfs || update-initramfs -u in both postinst and postrm. * Binary blob updates. * Documentation updates. [ Other info ] Diff was generated from the git tree, in order to avoid excessive noise due to the changes to the binary blobs. changelog | 57 +++++++++++++++++++++++ debian/changelog | 72 ++++++++++++++++++++++++++++++ debian/intel-microcode.postinst | 27 ++++++----- debian/intel-microcode.postrm | 7 +- intel-ucode/06-55-07 |binary intel-ucode/06-55-0b |binary intel-ucode/06-6a-06 |binary intel-ucode/06-6c-01 |binary intel-ucode/06-7a-01 |binary intel-ucode/06-7e-05 |binary intel-ucode/06-8c-01 |binary intel-ucode/06-8c-02 |binary intel-ucode/06-8d-01 |binary intel-ucode/06-8e-09 |binary intel-ucode/06-8e-0a |binary intel-ucode/06-8e-0b |binary intel-ucode/06-8e-0c |binary intel-ucode/06-96-01 |binary intel-ucode/06-9e-0a |binary intel-ucode/06-9e-0b |binary intel-ucode/06-9e-0c |binary intel-ucode/06-9e-0d |binary intel-ucode/06-a5-02 |binary intel-ucode/06-a5-03 |binary intel-ucode/06-a5-05 |binary intel-ucode/06-a6-00 |binary intel-ucode/06-a6-01 |binary intel-ucode/06-a7-01 |binary intel-ucode/06-aa-04 |binary releasenote.md | 96 ++++++++++++++++++++++++++++++++++++++++ 30 files changed, 244 insertions(+), 15 deletions(-) -- Henrique Holschuh
diff --git a/changelog b/changelog index 83989c4..d5e45bc 100644 --- a/changelog +++ b/changelog @@ -1,3 +1,60 @@ +2024-08-13: + * New upstream microcode datafile 20240813 (second release) + - Mitigations for INTEL-SA-01083 (CVE-2024-24853) + Incorrect behavior order in transition between executive monitor and SMI + transfer monitor (STM) in some Intel Processors may allow a privileged + user to potentially enable escalation of privilege via local access. + - Mitigations for INTEL-SA-01118 (CVE-2024-25939) + Mirrored regions with different values in 3rd Generation Intel Xeon + Scalable Processors may allow a privileged user to potentially enable + denial of service via local access. + - Mitigations for INTEL-SA-01100 (CVE-2024-24980) + Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel + Xeon Processors may allow a privileged user to potentially enable + escalation of privilege via local access. + - Mitigations for INTEL-SA-01038 (CVE-2023-42667) + Improper isolation in the Intel Core Ultra Processor stream cache + mechanism may allow an authenticated user to potentially enable + escalation of privilege via local access. + - Mitigations for INTEL-SA-01046 (CVE-2023-49141) + Improper isolation in some Intel® Processors stream cache mechanism may + allow an authenticated user to potentially enable escalation of + privilege via local access. + - Fix for unspecified functional issues on several processor models + * Updated microcodes: + sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936 + sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720 + sig 0x000606a6, pf_mask 0x87, 2024-04-01, rev 0xd0003e7, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-04-03, rev 0x10002b0, size 300032 + sig 0x000706e5, pf_mask 0x80, 2024-02-15, rev 0x00c6, size 114688 + sig 0x000806c1, pf_mask 0x80, 2024-02-15, rev 0x00b8, size 112640 + sig 0x000806c2, pf_mask 0xc2, 2024-02-15, rev 0x0038, size 99328 + sig 0x000806d1, pf_mask 0xc2, 2024-02-15, rev 0x0052, size 104448 + sig 0x000806e9, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806e9, pf_mask 0x10, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806ea, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 105472 + sig 0x000806eb, pf_mask 0xd0, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806ec, pf_mask 0x94, 2024-02-05, rev 0x00fc, size 106496 + sig 0x00090661, pf_mask 0x01, 2024-04-05, rev 0x001a, size 20480 + sig 0x000906ea, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 105472 + sig 0x000906eb, pf_mask 0x02, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000906ec, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 106496 + sig 0x000906ed, pf_mask 0x22, 2024-02-05, rev 0x0100, size 106496 + sig 0x000a0652, pf_mask 0x20, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304 + sig 0x000a0655, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0660, pf_mask 0x80, 2024-02-01, rev 0x00fe, size 97280 + sig 0x000a0661, pf_mask 0x80, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0671, pf_mask 0x02, 2024-03-07, rev 0x0062, size 108544 + sig 0x000a06a4, pf_mask 0xe6, 2024-04-15, rev 0x001e, size 137216 + +2024-05-31: + * New upstream microcode datafile 20240531 + - Fix unspecified functional issues on Pentium Silver N/J5xxx, + Celeron N/J4xxx + * Updated Microcodes: + sig 0x000706a1, pf_mask 0x01, 2024-04-19, rev 0x0042, size 76800 + 2024-05-14: * New upstream microcode datafile 20240514 - Mitigations for INTEL-SA-01051 (CVE-2023-45733) diff --git a/debian/changelog b/debian/changelog index 92b7e2b..5038f31 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,75 @@ +intel-microcode (3.20240813.1~deb12u1) bookworm; urgency=medium + + * Build for bookworm (no changes from 3.20240813.1) + + -- Henrique de Moraes Holschuh <h...@debian.org> Mon, 19 Aug 2024 21:59:40 -0300 + +intel-microcode (3.20240813.1) unstable; urgency=medium + + * New upstream microcode datafile 20240813 (closes: #1078742) + - Mitigations for INTEL-SA-01083 (CVE-2024-24853) + Incorrect behavior order in transition between executive monitor and SMI + transfer monitor (STM) in some Intel Processors may allow a privileged + user to potentially enable escalation of privilege via local access. + - Mitigations for INTEL-SA-01118 (CVE-2024-25939) + Mirrored regions with different values in 3rd Generation Intel Xeon + Scalable Processors may allow a privileged user to potentially enable + denial of service via local access. + - Mitigations for INTEL-SA-01100 (CVE-2024-24980) + Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel + Xeon Processors may allow a privileged user to potentially enable + escalation of privilege via local access. + - Mitigations for INTEL-SA-01038 (CVE-2023-42667) + Improper isolation in the Intel Core Ultra Processor stream cache + mechanism may allow an authenticated user to potentially enable + escalation of privilege via local access. + - Mitigations for INTEL-SA-01046 (CVE-2023-49141) + Improper isolation in some Intel® Processors stream cache mechanism may + allow an authenticated user to potentially enable escalation of + privilege via local access. + - Fix for unspecified functional issues on several processor models + * Updated microcodes: + sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936 + sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720 + sig 0x000606a6, pf_mask 0x87, 2024-04-01, rev 0xd0003e7, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-04-03, rev 0x10002b0, size 300032 + sig 0x000706e5, pf_mask 0x80, 2024-02-15, rev 0x00c6, size 114688 + sig 0x000806c1, pf_mask 0x80, 2024-02-15, rev 0x00b8, size 112640 + sig 0x000806c2, pf_mask 0xc2, 2024-02-15, rev 0x0038, size 99328 + sig 0x000806d1, pf_mask 0xc2, 2024-02-15, rev 0x0052, size 104448 + sig 0x000806e9, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806e9, pf_mask 0x10, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806ea, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 105472 + sig 0x000806eb, pf_mask 0xd0, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806ec, pf_mask 0x94, 2024-02-05, rev 0x00fc, size 106496 + sig 0x00090661, pf_mask 0x01, 2024-04-05, rev 0x001a, size 20480 + sig 0x000906ea, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 105472 + sig 0x000906eb, pf_mask 0x02, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000906ec, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 106496 + sig 0x000906ed, pf_mask 0x22, 2024-02-05, rev 0x0100, size 106496 + sig 0x000a0652, pf_mask 0x20, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304 + sig 0x000a0655, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0660, pf_mask 0x80, 2024-02-01, rev 0x00fe, size 97280 + sig 0x000a0661, pf_mask 0x80, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0671, pf_mask 0x02, 2024-03-07, rev 0x0062, size 108544 + sig 0x000a06a4, pf_mask 0xe6, 2024-04-15, rev 0x001e, size 137216 + * source: update symlinks to reflect id of the latest release, 20240813 + * postinst, postrm: switch to dpkg-trigger to run update-initramfs + + -- Henrique de Moraes Holschuh <h...@debian.org> Thu, 15 Aug 2024 14:41:50 -0300 + +intel-microcode (3.20240531.1) unstable; urgency=medium + + * New upstream microcode datafile 20240531 + * Fix unspecified functional issues on Pentium Silver N/J5xxx, + Celeron N/J4xxx + * Updated Microcodes: + sig 0x000706a1, pf_mask 0x01, 2024-04-19, rev 0x0042, size 76800 + * source: update symlinks to reflect id of the latest release, 20240531 + + -- Henrique de Moraes Holschuh <h...@debian.org> Sat, 01 Jun 2024 11:49:47 -0300 + intel-microcode (3.20240514.1~deb12u1) bookworm; urgency=medium * Build for bookworm (no changes) diff --git a/debian/intel-microcode.postinst b/debian/intel-microcode.postinst index 71f667a..a62c0a7 100644 --- a/debian/intel-microcode.postinst +++ b/debian/intel-microcode.postinst @@ -19,18 +19,21 @@ set -e case "$1" in configure) - # do it like udev and firmware-linux-* - if [ -x /usr/sbin/update-initramfs ] && [ -e /etc/initramfs-tools/initramfs.conf ] ; then - update-initramfs -u && { - echo "intel-microcode: microcode will be updated at next boot" >&2 - ls /usr/share/misc/intel-microcode* >/dev/null 2>&1 && { - echo "intel-microcode: possibly old microcode files from /usr/share/misc were used" >&2 - echo "intel-microcode: remove them if this is not desired and run 'update-initramfs -u'" >&2 - } - } - else - echo "intel-microcode: initramfs support missing" >&2 - fi + RC=0 + dpkg-trigger --no-await update-initramfs || RC=$? + [ "$RC" -ne 0 ] && [ -e /etc/initramfs-tools/initramfs.conf ] && { + RC=0 + update-initramfs -u || RC=$? + } + if [ "$RC" -eq 0 ] ; then + echo "intel-microcode: microcode will be updated at next boot" >&2 + ls /usr/share/misc/intel-microcode* >/dev/null 2>&1 && { + echo "intel-microcode: possibly old microcode files from /usr/share/misc were used" >&2 + echo "intel-microcode: remove them if this is not desired and run 'dpkg-reconfigure intel-microcode'" >&2 + } + else + echo "intel-microcode: initramfs support missing" >&2 + fi ;; abort-upgrade|abort-remove|abort-deconfigure) diff --git a/debian/intel-microcode.postrm b/debian/intel-microcode.postrm index 57791c8..425c182 100644 --- a/debian/intel-microcode.postrm +++ b/debian/intel-microcode.postrm @@ -20,9 +20,10 @@ set -e case "$1" in purge|remove) - if [ -x /usr/sbin/update-initramfs ] && [ -e /etc/initramfs-tools/initramfs.conf ] ; then - update-initramfs -u - fi + dpkg-trigger --no-await update-initramfs || { + #shellcheck disable=SC2015 + [ -e /etc/initramfs-tools/initramfs.conf ] && update-initramfs -u || : + } ;; upgrade|failed-upgrade|abort-install|abort-upgrade|disappear) diff --git a/intel-ucode/06-55-07 b/intel-ucode/06-55-07 index ed8e1bb..eb51392 100644 Binary files a/intel-ucode/06-55-07 and b/intel-ucode/06-55-07 differ diff --git a/intel-ucode/06-55-0b b/intel-ucode/06-55-0b index 3765a13..b59300e 100644 Binary files a/intel-ucode/06-55-0b and b/intel-ucode/06-55-0b differ diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06 index 9252ca3..7a2cb68 100644 Binary files a/intel-ucode/06-6a-06 and b/intel-ucode/06-6a-06 differ diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01 index 04ab878..019a72a 100644 Binary files a/intel-ucode/06-6c-01 and b/intel-ucode/06-6c-01 differ diff --git a/intel-ucode/06-7a-01 b/intel-ucode/06-7a-01 index ad4c017..ac377e9 100644 Binary files a/intel-ucode/06-7a-01 and b/intel-ucode/06-7a-01 differ diff --git a/intel-ucode/06-7e-05 b/intel-ucode/06-7e-05 index 70379a1..419b489 100644 Binary files a/intel-ucode/06-7e-05 and b/intel-ucode/06-7e-05 differ diff --git a/intel-ucode/06-8c-01 b/intel-ucode/06-8c-01 index b497e4f..8fc08a2 100644 Binary files a/intel-ucode/06-8c-01 and b/intel-ucode/06-8c-01 differ diff --git a/intel-ucode/06-8c-02 b/intel-ucode/06-8c-02 index 4707b7a..b371e6a 100644 Binary files a/intel-ucode/06-8c-02 and b/intel-ucode/06-8c-02 differ diff --git a/intel-ucode/06-8d-01 b/intel-ucode/06-8d-01 index 2a5ad8b..4b4bf88 100644 Binary files a/intel-ucode/06-8d-01 and b/intel-ucode/06-8d-01 differ diff --git a/intel-ucode/06-8e-09 b/intel-ucode/06-8e-09 index 0d11ae1..af8f21a 100644 Binary files a/intel-ucode/06-8e-09 and b/intel-ucode/06-8e-09 differ diff --git a/intel-ucode/06-8e-0a b/intel-ucode/06-8e-0a index 7fdf3fd..5170e0f 100644 Binary files a/intel-ucode/06-8e-0a and b/intel-ucode/06-8e-0a differ diff --git a/intel-ucode/06-8e-0b b/intel-ucode/06-8e-0b index b2e6a52..afd84dc 100644 Binary files a/intel-ucode/06-8e-0b and b/intel-ucode/06-8e-0b differ diff --git a/intel-ucode/06-8e-0c b/intel-ucode/06-8e-0c index 79b231e..6cf5f12 100644 Binary files a/intel-ucode/06-8e-0c and b/intel-ucode/06-8e-0c differ diff --git a/intel-ucode/06-96-01 b/intel-ucode/06-96-01 index 8f27f73..a218207 100644 Binary files a/intel-ucode/06-96-01 and b/intel-ucode/06-96-01 differ diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a index 20ae2f3..ccbd25f 100644 Binary files a/intel-ucode/06-9e-0a and b/intel-ucode/06-9e-0a differ diff --git a/intel-ucode/06-9e-0b b/intel-ucode/06-9e-0b index 4605e57..04a5997 100644 Binary files a/intel-ucode/06-9e-0b and b/intel-ucode/06-9e-0b differ diff --git a/intel-ucode/06-9e-0c b/intel-ucode/06-9e-0c index d5f3aa0..ba36a02 100644 Binary files a/intel-ucode/06-9e-0c and b/intel-ucode/06-9e-0c differ diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d index d3b689a..b4916c0 100644 Binary files a/intel-ucode/06-9e-0d and b/intel-ucode/06-9e-0d differ diff --git a/intel-ucode/06-a5-02 b/intel-ucode/06-a5-02 index 31a1a4d..a6fdab7 100644 Binary files a/intel-ucode/06-a5-02 and b/intel-ucode/06-a5-02 differ diff --git a/intel-ucode/06-a5-03 b/intel-ucode/06-a5-03 index 581d5cb..aadd8c9 100644 Binary files a/intel-ucode/06-a5-03 and b/intel-ucode/06-a5-03 differ diff --git a/intel-ucode/06-a5-05 b/intel-ucode/06-a5-05 index dffdcd5..1ac94fb 100644 Binary files a/intel-ucode/06-a5-05 and b/intel-ucode/06-a5-05 differ diff --git a/intel-ucode/06-a6-00 b/intel-ucode/06-a6-00 index 0c3b14a..82b2316 100644 Binary files a/intel-ucode/06-a6-00 and b/intel-ucode/06-a6-00 differ diff --git a/intel-ucode/06-a6-01 b/intel-ucode/06-a6-01 index e174946..fbd5a15 100644 Binary files a/intel-ucode/06-a6-01 and b/intel-ucode/06-a6-01 differ diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01 index 1610dee..cdd4d65 100644 Binary files a/intel-ucode/06-a7-01 and b/intel-ucode/06-a7-01 differ diff --git a/intel-ucode/06-aa-04 b/intel-ucode/06-aa-04 index cc1f4ab..170887a 100644 Binary files a/intel-ucode/06-aa-04 and b/intel-ucode/06-aa-04 differ diff --git a/microcode-20240514.d b/microcode-20240813.d similarity index 100% rename from microcode-20240514.d rename to microcode-20240813.d diff --git a/releasenote.md b/releasenote.md index efbe46a..e501368 100644 --- a/releasenote.md +++ b/releasenote.md @@ -1,3 +1,99 @@ +# Release Notes +## [microcode-20240813](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813) + +## Update: Corrected the MCU file for 06-a5-03 + +### Purpose + +- Security updates for [INTEL-SA-01083](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html) +- Security updates for [INTEL-SA-01118](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html) +- Security updates for [INTEL-SA-01100](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html) +- Security updates for [INTEL-SA-01038](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html) +- Security updates for [INTEL-SA-01046](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html) + + +- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details. +- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details. +- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details. +- Update for functional issues. Refer to [2nd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details +- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details. +- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details. +- Update for functional issues. Refer to [13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details. +- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details. +- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details. +- Update for functional issues. Refer to [10th Gen Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details. +- Update for functional issues. Refer to [10th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213) for details. +- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details. +- Update for functional issues. Refer to [8th Generation Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details. +- Update for functional issues. Refer to [7th and 8th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details. +- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details. +- Update for functional issues. Refer to [Intel® Atom® x6000E Series, and Intel® Pentium® and Celeron® N and J Series Processors for Internet of Things (IoT) Applications](https://cdrdv2.intel.com/v1/dl/getContent/636674) for details. + + +### New Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- + + +### Updated Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| AML-Y22 | H0 | 06-8e-09/10 | 000000f4 | 000000f6 | Core Gen8 Mobile +| AML-Y42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile +| CFL-H | R0 | 06-9e-0d/22 | 000000fc | 00000100 | Core Gen9 Mobile +| CFL-H/S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 +| CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000f6 | 000000f8 | Core Gen8 Desktop, Mobile, Xeon E +| CFL-S | B0 | 06-9e-0b/02 | 000000f4 | 000000f6 | Core Gen8 +| CFL-S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 Desktop +| CFL-U43e | D0 | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile +| CLX-SP | B1 | 06-55-07/bf | 05003605 | 05003707 | Xeon Scalable Gen2 +| CML-H | R1 | 06-a5-02/20 | 000000fa | 000000fc | Core Gen10 Mobile +| CML-S102 | Q0 | 06-a5-05/22 | 000000fa | 000000fc | Core Gen10 +| CML-S62 | G1 | 06-a5-03/22 | 000000fa | 000000fc | Core Gen10 +| CML-U42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile +| CML-U62 V1 | A0 | 06-a6-00/80 | 000000fa | 000000fe | Core Gen10 Mobile +| CML-U62 V2 | K1 | 06-a6-01/80 | 000000fa | 000000fc | Core Gen10 Mobile +| CML-Y42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile +| CPX-SP | A1 | 06-55-0b/bf | 07002802 | 07002904 | Xeon Scalable Gen3 +| EHL | B1 | 06-96-01/01 | 00000019 | 0000001a | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E +| ICL-D | B0 | 06-6c-01/10 | 01000290 | 010002b0 | Xeon D-17xx, D-27xx +| ICL-U/Y | D1 | 06-7e-05/80 | 000000c4 | 000000c6 | Core Gen10 Mobile +| ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003d1 | 0d0003e7 | Xeon Scalable Gen3 +| KBL-R U | Y0 | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile +| KBL-U23e | J1 | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile +| KBL-U/Y | H0 | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile +| MTL | C-0 | 06-aa-04/e6 | 0000001c | 0000001e | Core™ Ultra Processor +| RKL-S | B0 | 06-a7-01/02 | 0000005e | 00000062 | Core Gen11 +| TGL | B0/B1 | 06-8c-01/80 | 000000b6 | 000000b8 | Core Gen11 Mobile +| TGL-H | R0 | 06-8d-01/c2 | 00000050 | 00000052 | Core Gen11 Mobile +| TGL-R | C0 | 06-8c-02/c2 | 00000036 | 00000038 | Core Gen11 Mobile +| WHL-U | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen8 Mobile +| WHL-U | W0 | 06-8e-0b/d0 | 000000f4 | 000000f6 | Core Gen8 Mobile + + +# Release Notes +## [microcode-20240531](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240531) + +### Purpose + +- Update for functional issues. Refer to [Intel® Pentium® Silver and Intel® Celeron® Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/336562) + + +### New Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- + + +### Updated Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| GLK | B0 | 06-7a-01/01 | 00000040 | 00000042 | Pentium Silver N/J5xxx, Celeron N/J4xxx + + # Release Notes ## [microcode-20240514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514) diff --git a/supplementary-ucode-20240514_BDX-ML.bin b/supplementary-ucode-20240813_BDX-ML.bin similarity index 100% rename from supplementary-ucode-20240514_BDX-ML.bin rename to supplementary-ucode-20240813_BDX-ML.bin
signature.asc
Description: PGP signature