Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu

[ Reason ]

As requested by the security team, I would like to bring the microcode
update level for Intel processors in Bookworm to match what we have in Sid
and Trixie.

This adds or updates:
  - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
  - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
  - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
    CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
    CVE-2024-31157, CVE-2024-28047)
  - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
  - Mitigations for INTEL-SA-01194 (CVE-2024-37020)

It also fixes:
  - unspecified functional issues on several processors

There are no releavant issues reported on this microcode update,
considering the version of intel-microcode already available as security
updates for Bookworm.

[ Impact ]

If this update is not approved, owners of most recent "client" Intel
processors and a few server processors will depend on UEFI updates to be
protected from the issues listed above.

[ Tests ]

There were no bug reports from users of Debian sid or Trixie, these
packages have been tested there since 2025-02-16 (sid), 2025-02-22
(trixie).

[ Risks ]

Unknown, but not believed to be any different from other Intel microcode
updates.

[ Checklist ]

  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

As per the debdiff, only documentation changes, package documentation
changes, and the binary blob change from upstream.

 b/changelog            |   71 +++++++++++++++++++++++++++++++++++++++++
 b/debian/changelog     |   83 +++++++++++++++++++++++++++++++++++++++++++++++++
 b/intel-ucode/06-6a-06 |binary
 b/intel-ucode/06-6c-01 |binary
 b/intel-ucode/06-8f-07 |binary
 b/intel-ucode/06-8f-08 |binary
 b/intel-ucode/06-97-02 |binary
 b/intel-ucode/06-97-05 |binary
 b/intel-ucode/06-9a-03 |binary
 b/intel-ucode/06-9a-04 |binary
 b/intel-ucode/06-9e-0a |binary
 b/intel-ucode/06-9e-0d |binary
 b/intel-ucode/06-a7-01 |binary
 b/intel-ucode/06-af-03 |binary
 b/intel-ucode/06-b7-01 |binary
 b/intel-ucode/06-ba-02 |binary
 b/intel-ucode/06-ba-03 |binary
 b/intel-ucode/06-be-00 |binary
 b/intel-ucode/06-bf-02 |binary
 b/intel-ucode/06-bf-05 |binary
 b/intel-ucode/06-cf-01 |binary
 b/intel-ucode/06-cf-02 |binary
 b/releasenote.md       |   62 ++++++++++++++++++++++++++++++++++++
 24 files changed, 216 insertions(+)

[ Other info ]

The package version with "~" is needed to guarantee smooth updates to
the next debian release.

-- 
  Henrique Holschuh
diff --git a/changelog b/changelog
index a611986..50af05b 100644
--- a/changelog
+++ b/changelog
@@ -1,3 +1,68 @@
+2025-02-11:
+  * New upstream microcode datafile 20250211
+    - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
+      Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
+      Processors may allow privileged user to potentially enable denial of
+      service via local access.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel disclosed
+      that some 9th Generation Intel Core processor models were already fixed
+      by a previous microcode update.
+    - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
+      CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
+      CVE-2024-31157, CVE-2024-28047)
+      Improper input validation, insufficient granularity of access control,
+      and improper initialization issues in UEFI firmware for some Intel
+      processors may allow escalation of privilege, denial of service, or
+      information disclosure.  An UEFI firmware update is needed for complete
+      mitigation.
+    - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
+      Improper handling of physical or environmental conditions in some 13th
+      and 14th Generation Intel Core Processors may allow an authenticated
+      user to enable denial of service via local access.  An UEFI firmware
+      update may be required for complete mitigation.
+    - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
+      Sequence of processor instructions leads to unexpected behavior in the
+      Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
+      user to potentially enable denial of service via local access.
+    - Fixes for unspecified functional issues on several processor models
+  * New microcodes or new extended signatures:
+    sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
+    sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+  * Updated microcodes:
+    sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
+    sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
+    sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
+    sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
+    sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
+    sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
+    sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
+    sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
+    sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
+    sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+    sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
+    sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
+
 2024-11-12:
   * New upstream microcode datafile 20241112
     - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
@@ -108,6 +173,12 @@
       disclosure.  Intel released this information during the full disclosure
       for the 20240910 update.  Processor signatures 0x5065b, 0x606a6,
       0x606c1.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel released
+      this information during the full disclosure for the 20250211 update.
+      Processor signature 0x906ec (9th Generation Intel Core processor).
     - Fix for unspecified functional issues on several processor models
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
diff --git a/debian/changelog b/debian/changelog
index 3d0dc0d..3a251c5 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,80 @@
+intel-microcode (3.20250211.1~deb12u1) bookworm; urgency=medium
+
+  * Build for bookworm
+  * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sat, 08 Mar 2025 09:15:30 -0300
+
+intel-microcode (3.20250211.1) unstable; urgency=medium
+
+  * New upstream microcode datafile 20250211 (closes: #1095805)
+    - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
+      Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
+      Processors may allow privileged user to potentially enable denial of
+      service via local access.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel disclosed
+      that some 9th Generation Intel Core processor models were already fixed
+      by a previous microcode update.
+    - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
+      CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
+      CVE-2024-31157, CVE-2024-28047)
+      Improper input validation, insufficient granularity of access control,
+      and improper initialization issues in UEFI firmware for some Intel
+      processors may allow escalation of privilege, denial of service, or
+      information disclosure.  An UEFI firmware update is needed for complete
+      mitigation.
+    - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
+      Improper handling of physical or environmental conditions in some 13th
+      and 14th Generation Intel Core Processors may allow an authenticated
+      user to enable denial of service via local access.  An UEFI firmware
+      update may be required for complete mitigation.
+    - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
+      Sequence of processor instructions leads to unexpected behavior in the
+      Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
+      user to potentially enable denial of service via local access.
+    - Fixes for unspecified functional issues on several processor models
+  * New microcodes or new extended signatures:
+    sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
+    sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+  * Updated microcodes:
+    sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
+    sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
+    sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
+    sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
+    sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
+    sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
+    sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
+    sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
+    sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
+    sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+    sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
+    sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
+  * source: update symlinks to reflect id of the latest release, 20250211
+  * Update changelog for 3.20240813.1 with new information
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sun, 16 Feb 2025 18:34:38 -0300
+
 intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium
 
   * Build for bookworm
@@ -150,6 +227,12 @@ intel-microcode (3.20240813.1) unstable; urgency=medium
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
       release, or by one of the microcode updates from 2024-05.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel released
+      this information during the full disclosure for the 20250211 update.
+      Processor signature 0x906ec (9th Generation Intel Core processor).
   * Updated microcodes:
     sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936
     sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720
diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06
index 7a2cb68..d4a366f 100644
Binary files a/intel-ucode/06-6a-06 and b/intel-ucode/06-6a-06 differ
diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01
index 019a72a..1676c98 100644
Binary files a/intel-ucode/06-6c-01 and b/intel-ucode/06-6c-01 differ
diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05
deleted file mode 100644
index 34b14f1..0000000
Binary files a/intel-ucode/06-8f-05 and /dev/null differ
diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06
deleted file mode 100644
index 34b14f1..0000000
Binary files a/intel-ucode/06-8f-06 and /dev/null differ
diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07
index 803094c..ba8c8fd 100644
Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ
diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08
index 34b14f1..7bc6a8f 100644
Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ
diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ
diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ
diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03
index d60fc12..fe20c2c 100644
Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ
diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04
index f1f5fc6..0268fc4 100644
Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ
diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a
index ccbd25f..7eb1a98 100644
Binary files a/intel-ucode/06-9e-0a and b/intel-ucode/06-9e-0a differ
diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d
index b4916c0..949389d 100644
Binary files a/intel-ucode/06-9e-0d and b/intel-ucode/06-9e-0d differ
diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01
index cdd4d65..32eeaac 100644
Binary files a/intel-ucode/06-a7-01 and b/intel-ucode/06-a7-01 differ
diff --git a/intel-ucode/06-af-03 b/intel-ucode/06-af-03
new file mode 100644
index 0000000..9629bae
Binary files /dev/null and b/intel-ucode/06-af-03 differ
diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01
index d57fa9d..a0b16ee 100644
Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ
diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02
index 19c9647..7359151 100644
Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ
diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03
index 19c9647..7359151 100644
Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ
diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08
deleted file mode 100644
index 19c9647..0000000
Binary files a/intel-ucode/06-ba-08 and /dev/null differ
diff --git a/intel-ucode/06-be-00 b/intel-ucode/06-be-00
index 5316c7e..2a61c4a 100644
Binary files a/intel-ucode/06-be-00 and b/intel-ucode/06-be-00 differ
diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ
diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ
diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01
index 4f47576..937187a 100644
Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ
diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02
index 4f47576..937187a 100644
Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ
diff --git a/microcode-20241112.d b/microcode-20250211.d
similarity index 100%
rename from microcode-20241112.d
rename to microcode-20250211.d
diff --git a/releasenote.md b/releasenote.md
index 1c417fa..300576b 100644
--- a/releasenote.md
+++ b/releasenote.md
@@ -1,4 +1,66 @@
 # Release Notes
+## [microcode-20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01166](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html)
+- Security updates for [INTEL-SA-01213](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html)
+- Security updates for [INTEL-SA-01139](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html)
+- Security updates for [INTEL-SA-01228](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html)
+- Security updates for [INTEL-SA-01194](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html)
+
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [13th/14th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
+- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
+- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
+- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
+- Update for functional issues. Refer to [Intel® Xeon® 6700-Series Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/820922) for details.
+- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details
+
+### New Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| SRF-SP         | C0       | 06-af-03/01 |          | 03000330 | Xeon 6700-Series Processors with E-Cores
+
+### Updated Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL            | C0       | 06-97-02/07 | 00000037 | 00000038 | Core Gen12
+| ADL            | H0       | 06-97-05/07 | 00000037 | 00000038 | Core Gen12
+| ADL            | L0       | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12
+| ADL            | R0       | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12
+| ADL-N          | N0       | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+| AZB            | A0/R0    | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100
+| CFL-H          | R0       | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile
+| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E
+| EMR-SP         | A0       | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5
+| EMR-SP         | A1       | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5
+| ICL-D          | B0       | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx
+| ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3
+| RPL-E/HX/S     | B0       | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14
+| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13
+| RPL-HX/S       | C0       | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14
+| RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13
+| RPL-S          | H0       | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14
+| RKL-S          | B0       | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11
+| SPR-HBM        | Bx       | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max
+| SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 
+| SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4
+| TWL            | N0       | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+
+### New Disclosures Updated in Prior Releases
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| CFL-H/S        | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
+
 ## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112)
 
 ### Purpose
diff --git a/supplementary-ucode-20241112_BDX-ML.bin b/supplementary-ucode-20250211_BDX-ML.bin
similarity index 100%
rename from supplementary-ucode-20241112_BDX-ML.bin
rename to supplementary-ucode-20250211_BDX-ML.bin

Attachment: signature.asc
Description: PGP signature

Reply via email to