Your message dated Sat, 11 Jan 2025 11:03:09 +0000
with message-id <e1twzgn-009jyo...@coccia.debian.org>
and subject line Close 1089279
has caused the Debian Bug report #1089279,
regarding bookworm-pu: package intel-microcode/3.20241112.1~deb12u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1089279: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089279
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu

[ Reason ]

As requested by the security team, I would like to bring the microcode
update level for Intel processors in Bookworm to match what we have in Sid
and Trixie.

This fixes:
  - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
  - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
  - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
  - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
  * Other unspecified functional issues on several processors

There are no releavant issues reported on this microcode update,
considering the version of intel-microcode already available as security
updates for Bookworm.

[ Impact ]

If this update is not approved, owners of most recent "client" Intel
processors and a few server processors will depend on UEFI updates to be
protected from the issues listed above.

[ Tests ]

There were no bug reports from users of Debian sid or Trixie, these
packages have been tested there since 2024-11-14 (sid), 2024-11-20
(trixie).

[ Risks ]

Unknown, but not believed to be any different from other Intel microcode
updates.

[ Checklist ]

  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

As per the debdiff, only documentation changes, package documentation
changes, and the binary blob change from upstream.

 changelog            |   66 ++++++++++++++++++++++++++++++++++++---
 debian/changelog     |   86 +++++++++++++++++++++++++++++++++++++++++++++++----
 intel-ucode/06-8f-05 |binary
 intel-ucode/06-8f-06 |binary
 intel-ucode/06-8f-07 |binary
 intel-ucode/06-8f-08 |binary
 intel-ucode/06-97-02 |binary
 intel-ucode/06-97-05 |binary
 intel-ucode/06-9a-03 |binary
 intel-ucode/06-9a-04 |binary
 intel-ucode/06-aa-04 |binary
 intel-ucode/06-b7-01 |binary
 intel-ucode/06-ba-02 |binary
 intel-ucode/06-ba-03 |binary
 intel-ucode/06-ba-08 |binary
 intel-ucode/06-bf-02 |binary
 intel-ucode/06-bf-05 |binary
 intel-ucode/06-cf-01 |binary
 intel-ucode/06-cf-02 |binary
 releasenote.md       |   72 ++++++++++++++++++++++++++++++++++++++++++
 20 files changed, 213 insertions(+), 11 deletions(-)

[ Other info ]

The package version with "~" is needed to guarantee smooth updates to
the next debian release.

-- 
  Henrique Holschuh
diff --git a/changelog b/changelog
index e6eb97c..a611986 100644
--- a/changelog
+++ b/changelog
@@ -1,12 +1,57 @@
-2024-09-10:
-  * New upstream microcode datafile 20240910
+2024-11-12:
+  * New upstream microcode datafile 20241112
+    - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
+      Improper Finite State Machines (FSMs) in the Hardware logic in
+      some 4th and 5th Generation Intel Xeon Processors may allow an
+      authorized user to potentially enable denial of service via local
+      access.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel disclosed
+      that some processor models were already fixed by a previous microcode
+      update.
+    - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
     - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
       A potential security vulnerability in the Running Average Power Limit
       (RAPL) interface for some Intel Processors may allow information
-      disclosure.
+      disclosure.  Added mitigations for more processor models.
+  * Updated Microcodes:
+    sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
+    sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
+    sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
+    sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
+    sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
+
+2024-10-29:
+  * New upstream microcode datafile 20241029
+    - Fixes errata RPL061: Incorrect Internal Voltage Request May Lead to
+      Unpredictable System Behavior.  This errata could eventually cause
+      permanent hardware damage to the processor.  This fix is only active
+      when the microcode update is loaded from FIT (i.e. in firmware).
+  * Updated Microcodes:
+    sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
+
+2024-09-10:
+  * New upstream microcode datafile 20240910
     - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
-      A potential security vulnerability in some Intel Processors may allow
-      denial of service.
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
     - Fixes for unspecified functional issues on several processor models
     - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
       FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
@@ -52,6 +97,17 @@
       allow an authenticated user to potentially enable escalation of
       privilege via local access.  Intel disclosed that some processor models
       were already fixed by the previous microcode update.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel released this
+      information during the full disclosure for the 20241112 update.
+      Processor signatures 0x606a6 and 0x606c1.
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure.  Intel released this information during the full disclosure
+      for the 20240910 update.  Processor signatures 0x5065b, 0x606a6,
+      0x606c1.
     - Fix for unspecified functional issues on several processor models
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
diff --git a/debian/changelog b/debian/changelog
index 5e6276e..3d0dc0d 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,69 @@
+intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium
+
+  * Build for bookworm
+  * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sat, 07 Dec 2024 14:49:05 -0300
+
+intel-microcode (3.20241112.1) unstable; urgency=medium
+
+  * New upstream microcode datafile 20241112 (closes: #1086483)
+    - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
+      Improper Finite State Machines (FSMs) in the Hardware logic in some
+      4th and 5th Generation Intel Xeon Processors may allow an authorized
+      user to potentially enable denial of service via local access.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel disclosed
+      that some processor models were already fixed by a previous
+      microcode update.
+    - Updated mitigations for INTEL-SA-01097 (CVE-2024-24968)
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure.  Added mitigations for more processor models.
+  * Updated Microcodes:
+    sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
+    sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603
+    sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
+    sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037
+    sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435
+    sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
+    sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123
+    sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283
+  * source: update symlinks to reflect id of the latest release, 20241112
+  * Update changelog for 3.20240910.1 and 3.20240813.1 with new information:
+    INTEL-SA-1103 was addressed by 3.20240813.1 for some processor models,
+    and not by 3.20240910. INTEL-SA-1079 was addressed by 3.20240910.1 for
+    some processor models.
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Thu, 14 Nov 2024 15:37:40 -0300
+
+intel-microcode (3.20241029.1) UNRELEASED; urgency=medium
+
+  * New upstream microcode datafile 20241029
+    - Not relevant for operating system microcode updates
+    - Only when loaded from firmware, this update fixes the critical,
+      potentially hardware-damaging errata RPL061: Incorrect Internal
+      Voltage Request on Raptor Lake (Core 13th/14th gen) Intel
+      processors.
+  * Updated Microcodes:
+    sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Thu, 14 Nov 2024 14:49:03 -0300
+
 intel-microcode (3.20240910.1~deb12u1) bookworm; urgency=medium
 
   * Build for bookworm
@@ -8,13 +74,10 @@ intel-microcode (3.20240910.1~deb12u1) bookworm; urgency=medium
 intel-microcode (3.20240910.1) unstable; urgency=medium
 
   * New upstream microcode datafile 20240910 (closes: #1081363)
-    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
-      A potential security vulnerability in the Running Average Power Limit
-      (RAPL) interface for some Intel Processors may allow information
-      disclosure.
     - Mitigations for INTEL-SA-01097 (CVE-2024-24968)
-      A potential security vulnerability in some Intel Processors may allow
-      denial of service.
+      Improper finite state machines (FSMs) in hardware logic in some
+      Intel Processors may allow an privileged user to potentially enable a
+      denial of service via local access.
     - Fixes for unspecified functional issues on several processor models
     - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A
       FIRMWARE UPDATE.  It is present in this release for sig 0xb0671, but
@@ -72,6 +135,17 @@ intel-microcode (3.20240813.1) unstable; urgency=medium
       allow an authenticated user to potentially enable escalation of
       privilege via local access.  Intel disclosed that some processor models
       were already fixed by the previous microcode update.
+    - Mitigations for INTEL-SA-01079 (CVE-2024-23918)
+      Potential security vulnerabilities in some Intel Xeon processors
+      using Intel SGX may allow escalation of privilege.  Intel released this
+      information during the full disclosure for the 20241112 update.
+      Processor signatures 0x606a6 and 0x606c1.
+    - Mitigations for INTEL-SA-01103 (CVE-2024-23984)
+      A potential security vulnerability in the Running Average Power Limit
+      (RAPL) interface for some Intel Processors may allow information
+      disclosure. Intel released this information during the full disclosure
+      for the 20240910 update.  Processor signatures 0x5065b, 0x606a6,
+      0x606c1.
     - Fix for unspecified functional issues on several processor models
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-05 and b/intel-ucode/06-8f-05 differ
diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-06 and b/intel-ucode/06-8f-06 differ
diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07
index d629737..803094c 100644
Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ
diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08
index ef5b752..34b14f1 100644
Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ
diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ
diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ
diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03
index ac46000..d60fc12 100644
Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ
diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04
index 5630a87..f1f5fc6 100644
Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ
diff --git a/intel-ucode/06-aa-04 b/intel-ucode/06-aa-04
index f7ce6aa..267b835 100644
Binary files a/intel-ucode/06-aa-04 and b/intel-ucode/06-aa-04 differ
diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01
index ed73396..d57fa9d 100644
Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ
diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ
diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ
diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08
index 76a1275..19c9647 100644
Binary files a/intel-ucode/06-ba-08 and b/intel-ucode/06-ba-08 differ
diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ
diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05
index efd034d..68441d5 100644
Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ
diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01
index 85ed301..4f47576 100644
Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ
diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02
index 85ed301..4f47576 100644
Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ
diff --git a/microcode-20240910.d b/microcode-20241112.d
similarity index 100%
rename from microcode-20240910.d
rename to microcode-20241112.d
diff --git a/releasenote.md b/releasenote.md
index f00475e..1c417fa 100644
--- a/releasenote.md
+++ b/releasenote.md
@@ -1,3 +1,75 @@
+# Release Notes
+## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01101](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html)
+- Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html)
+- Updated security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html)
+- Updated security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html)
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [14th/13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
+- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-1700 and D-1800 Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714069) for details
+
+
+### New Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL            | C0       | 06-97-02/07 | 00000036 | 00000037 | Core Gen12
+| ADL            | H0       | 06-97-05/07 | 00000036 | 00000037 | Core Gen12
+| ADL            | L0       | 06-9a-03/80 | 00000434 | 00000435 | Core Gen12
+| ADL            | R0       | 06-9a-04/80 | 00000434 | 00000435 | Core Gen12
+| EMR-SP         | A0       | 06-cf-01/87 | 21000230 | 21000283 | Xeon Scalable Gen5
+| EMR-SP         | A1       | 06-cf-02/87 | 21000230 | 21000283 | Xeon Scalable Gen5
+| MTL            | C0       | 06-aa-04/e6 | 0000001f | 00000020 | Core™ Ultra Processor
+| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004122 | 00004123 | Core Gen13
+| RPL-HX/S       | C0       | 06-bf-02/07 | 00000036 | 00000037 | Core Gen13/Gen14
+| RPL-S          | H0       | 06-bf-05/07 | 00000036 | 00000037 | Core Gen13/Gen14
+| RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004122 | 00004123 | Core Gen13
+| SPR-SP         | E3       | 06-8f-06/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+| SPR-SP         | E4/S2    | 06-8f-07/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+| SPR-SP         | E5/S3    | 06-8f-08/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
+
+### New Disclosures Updated in Prior Releases
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ICL-D          | B0       | 06-6c-01/10 | 010002b0 | N/A      | Xeon D-17xx/D-18xx, D-27xx/D-28xx
+| ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | N/A      | Xeon Scalable Gen3
+
+
+# Release Notes
+## [microcode-20241029](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029)
+
+### Purpose
+
+- Update for functional issues. Refer to [14th/13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+
+### New Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| RPL-E/HX/S     | B0       | 06-b7-01/32 | 00000129 | 0000012b | Core Gen13/Gen14
+
+
 # Release Notes
 ## [microcode-20240910](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)
 
diff --git a/supplementary-ucode-20240910_BDX-ML.bin b/supplementary-ucode-20241112_BDX-ML.bin
similarity index 100%
rename from supplementary-ucode-20240910_BDX-ML.bin
rename to supplementary-ucode-20241112_BDX-ML.bin

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 12.9
This update has been released as part of 12.9. Thank you for your contribution.

--- End Message ---

Reply via email to