Package: release.debian.org Severity: normal Tags: bookworm User: release.debian....@packages.debian.org Usertags: pu
[ Reason ] As requested by the security team, I would like to bring the microcode update level for Intel processors in Bookworm to match what we have in Sid and Trixie. This adds or updates: - Mitigations for INTEL-SA-01166 (CVE-2024-31068) - Mitigations for INTEL-SA-01213 (CVE-2024-36293) - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440, CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279, CVE-2024-31157, CVE-2024-28047) - Mitigations for INTEL-SA-01228 (CVE-2024-39355) - Mitigations for INTEL-SA-01194 (CVE-2024-37020) It also fixes: - unspecified functional issues on several processors There are no releavant issues reported on this microcode update, considering the version of intel-microcode already available as security updates for Bookworm. [ Impact ] If this update is not approved, owners of most recent "client" Intel processors and a few server processors will depend on UEFI updates to be protected from the issues listed above. [ Tests ] There were no bug reports from users of Debian sid or Trixie, these packages have been tested there since 2025-02-16 (sid), 2025-02-22 (trixie). [ Risks ] Unknown, but not believed to be any different from other Intel microcode updates. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Changes ] As per the debdiff, only documentation changes, package documentation changes, and the binary blob change from upstream. b/changelog | 71 +++++++++++++++++++++++++++++++++++++++++ b/debian/changelog | 83 +++++++++++++++++++++++++++++++++++++++++++++++++ b/intel-ucode/06-6a-06 |binary b/intel-ucode/06-6c-01 |binary b/intel-ucode/06-8f-07 |binary b/intel-ucode/06-8f-08 |binary b/intel-ucode/06-97-02 |binary b/intel-ucode/06-97-05 |binary b/intel-ucode/06-9a-03 |binary b/intel-ucode/06-9a-04 |binary b/intel-ucode/06-9e-0a |binary b/intel-ucode/06-9e-0d |binary b/intel-ucode/06-a7-01 |binary b/intel-ucode/06-af-03 |binary b/intel-ucode/06-b7-01 |binary b/intel-ucode/06-ba-02 |binary b/intel-ucode/06-ba-03 |binary b/intel-ucode/06-be-00 |binary b/intel-ucode/06-bf-02 |binary b/intel-ucode/06-bf-05 |binary b/intel-ucode/06-cf-01 |binary b/intel-ucode/06-cf-02 |binary b/releasenote.md | 62 ++++++++++++++++++++++++++++++++++++ 24 files changed, 216 insertions(+) [ Other info ] The package version with "~" is needed to guarantee smooth updates to the next debian release. -- Henrique Holschuh
diff --git a/changelog b/changelog index a611986..50af05b 100644 --- a/changelog +++ b/changelog @@ -1,3 +1,68 @@ +2025-02-11: + * New upstream microcode datafile 20250211 + - Mitigations for INTEL-SA-01166 (CVE-2024-31068) + Improper Finite State Machines (FSMs) in Hardware Logic for some Intel + Processors may allow privileged user to potentially enable denial of + service via local access. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel disclosed + that some 9th Generation Intel Core processor models were already fixed + by a previous microcode update. + - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440, + CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279, + CVE-2024-31157, CVE-2024-28047) + Improper input validation, insufficient granularity of access control, + and improper initialization issues in UEFI firmware for some Intel + processors may allow escalation of privilege, denial of service, or + information disclosure. An UEFI firmware update is needed for complete + mitigation. + - Mitigations for INTEL-SA-01228 (CVE-2024-39355) + Improper handling of physical or environmental conditions in some 13th + and 14th Generation Intel Core Processors may allow an authenticated + user to enable denial of service via local access. An UEFI firmware + update may be required for complete mitigation. + - Mitigations for INTEL-SA-01194 (CVE-2024-37020) + Sequence of processor instructions leads to unexpected behavior in the + Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated + user to potentially enable denial of service via local access. + - Fixes for unspecified functional issues on several processor models + * New microcodes or new extended signatures: + sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952 + sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + * Updated microcodes: + sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032 + sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824 + sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592 + sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232 + sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436 + sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808 + sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472 + sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496 + sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544 + sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240 + sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128 + sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291 + 2024-11-12: * New upstream microcode datafile 20241112 - Mitigations for INTEL-SA-01101 (CVE-2024-21853) @@ -108,6 +173,12 @@ disclosure. Intel released this information during the full disclosure for the 20240910 update. Processor signatures 0x5065b, 0x606a6, 0x606c1. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel released + this information during the full disclosure for the 20250211 update. + Processor signature 0x906ec (9th Generation Intel Core processor). - Fix for unspecified functional issues on several processor models - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a microcode update". It is not clear which processors were fixed by this diff --git a/debian/changelog b/debian/changelog index 3d0dc0d..3a251c5 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,80 @@ +intel-microcode (3.20250211.1~deb12u1) bookworm; urgency=medium + + * Build for bookworm + * All trixie-only changes (from 3.20240813.2) are reverted on this branch + + -- Henrique de Moraes Holschuh <h...@debian.org> Sat, 08 Mar 2025 09:15:30 -0300 + +intel-microcode (3.20250211.1) unstable; urgency=medium + + * New upstream microcode datafile 20250211 (closes: #1095805) + - Mitigations for INTEL-SA-01166 (CVE-2024-31068) + Improper Finite State Machines (FSMs) in Hardware Logic for some Intel + Processors may allow privileged user to potentially enable denial of + service via local access. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel disclosed + that some 9th Generation Intel Core processor models were already fixed + by a previous microcode update. + - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440, + CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279, + CVE-2024-31157, CVE-2024-28047) + Improper input validation, insufficient granularity of access control, + and improper initialization issues in UEFI firmware for some Intel + processors may allow escalation of privilege, denial of service, or + information disclosure. An UEFI firmware update is needed for complete + mitigation. + - Mitigations for INTEL-SA-01228 (CVE-2024-39355) + Improper handling of physical or environmental conditions in some 13th + and 14th Generation Intel Core Processors may allow an authenticated + user to enable denial of service via local access. An UEFI firmware + update may be required for complete mitigation. + - Mitigations for INTEL-SA-01194 (CVE-2024-37020) + Sequence of processor instructions leads to unexpected behavior in the + Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated + user to potentially enable denial of service via local access. + - Fixes for unspecified functional issues on several processor models + * New microcodes or new extended signatures: + sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952 + sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + * Updated microcodes: + sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032 + sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824 + sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620 + sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592 + sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0 + sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280 + sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038 + sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232 + sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436 + sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808 + sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472 + sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496 + sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544 + sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968 + sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124 + sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240 + sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128 + sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291 + * source: update symlinks to reflect id of the latest release, 20250211 + * Update changelog for 3.20240813.1 with new information + + -- Henrique de Moraes Holschuh <h...@debian.org> Sun, 16 Feb 2025 18:34:38 -0300 + intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium * Build for bookworm @@ -150,6 +227,12 @@ intel-microcode (3.20240813.1) unstable; urgency=medium - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a microcode update". It is not clear which processors were fixed by this release, or by one of the microcode updates from 2024-05. + - Mitigations for INTEL-SA-01213 (CVE-2024-36293) + Improper access control in the EDECCSSA user leaf function for some + Intel Processors with Intel SGX may allow an authenticated user to + potentially enable denial of service via local access. Intel released + this information during the full disclosure for the 20250211 update. + Processor signature 0x906ec (9th Generation Intel Core processor). * Updated microcodes: sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936 sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720 diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06 index 7a2cb68..d4a366f 100644 Binary files a/intel-ucode/06-6a-06 and b/intel-ucode/06-6a-06 differ diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01 index 019a72a..1676c98 100644 Binary files a/intel-ucode/06-6c-01 and b/intel-ucode/06-6c-01 differ diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05 deleted file mode 100644 index 34b14f1..0000000 Binary files a/intel-ucode/06-8f-05 and /dev/null differ diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06 deleted file mode 100644 index 34b14f1..0000000 Binary files a/intel-ucode/06-8f-06 and /dev/null differ diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07 index 803094c..ba8c8fd 100644 Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08 index 34b14f1..7bc6a8f 100644 Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03 index d60fc12..fe20c2c 100644 Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04 index f1f5fc6..0268fc4 100644 Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a index ccbd25f..7eb1a98 100644 Binary files a/intel-ucode/06-9e-0a and b/intel-ucode/06-9e-0a differ diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d index b4916c0..949389d 100644 Binary files a/intel-ucode/06-9e-0d and b/intel-ucode/06-9e-0d differ diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01 index cdd4d65..32eeaac 100644 Binary files a/intel-ucode/06-a7-01 and b/intel-ucode/06-a7-01 differ diff --git a/intel-ucode/06-af-03 b/intel-ucode/06-af-03 new file mode 100644 index 0000000..9629bae Binary files /dev/null and b/intel-ucode/06-af-03 differ diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01 index d57fa9d..a0b16ee 100644 Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02 index 19c9647..7359151 100644 Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03 index 19c9647..7359151 100644 Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08 deleted file mode 100644 index 19c9647..0000000 Binary files a/intel-ucode/06-ba-08 and /dev/null differ diff --git a/intel-ucode/06-be-00 b/intel-ucode/06-be-00 index 5316c7e..2a61c4a 100644 Binary files a/intel-ucode/06-be-00 and b/intel-ucode/06-be-00 differ diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05 index 68441d5..600a5ee 100644 Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01 index 4f47576..937187a 100644 Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02 index 4f47576..937187a 100644 Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ diff --git a/microcode-20241112.d b/microcode-20250211.d similarity index 100% rename from microcode-20241112.d rename to microcode-20250211.d diff --git a/releasenote.md b/releasenote.md index 1c417fa..300576b 100644 --- a/releasenote.md +++ b/releasenote.md @@ -1,4 +1,66 @@ # Release Notes +## [microcode-20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211) + +### Purpose + +- Security updates for [INTEL-SA-01166](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html) +- Security updates for [INTEL-SA-01213](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html) +- Security updates for [INTEL-SA-01139](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html) +- Security updates for [INTEL-SA-01228](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html) +- Security updates for [INTEL-SA-01194](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html) + +- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details. +- Update for functional issues. Refer to [13th/14th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details. +- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details. +- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details. +- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details. +- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details. +- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details. +- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details. +- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details. +- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details. +- Update for functional issues. Refer to [Intel® Xeon® 6700-Series Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/820922) for details. +- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details + +### New Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| SRF-SP | C0 | 06-af-03/01 | | 03000330 | Xeon 6700-Series Processors with E-Cores + +### Updated Platforms + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| ADL | C0 | 06-97-02/07 | 00000037 | 00000038 | Core Gen12 +| ADL | H0 | 06-97-05/07 | 00000037 | 00000038 | Core Gen12 +| ADL | L0 | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12 +| ADL | R0 | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12 +| ADL-N | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E +| AZB | A0/R0 | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100 +| CFL-H | R0 | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile +| CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E +| EMR-SP | A0 | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5 +| EMR-SP | A1 | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5 +| ICL-D | B0 | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx +| ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3 +| RPL-E/HX/S | B0 | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14 +| RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13 +| RPL-HX/S | C0 | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14 +| RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13 +| RPL-S | H0 | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14 +| RKL-S | B0 | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11 +| SPR-HBM | Bx | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max +| SPR-SP | E4/S2 | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 +| SPR-SP | E5/S3 | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 +| TWL | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E + +### New Disclosures Updated in Prior Releases + +| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products +|:---------------|:---------|:------------|:---------|:---------|:--------- +| CFL-H/S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 + ## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112) ### Purpose diff --git a/supplementary-ucode-20241112_BDX-ML.bin b/supplementary-ucode-20250211_BDX-ML.bin similarity index 100% rename from supplementary-ucode-20241112_BDX-ML.bin rename to supplementary-ucode-20250211_BDX-ML.bin
signature.asc
Description: PGP signature