--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu
[ Reason ]
As requested by the security team, I would like to bring the microcode
update level for Intel processors in Bookworm to match what we have in Sid
and Trixie.
This adds or updates:
- Mitigations for INTEL-SA-01166 (CVE-2024-31068)
- Mitigations for INTEL-SA-01213 (CVE-2024-36293)
- Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
CVE-2024-31157, CVE-2024-28047)
- Mitigations for INTEL-SA-01228 (CVE-2024-39355)
- Mitigations for INTEL-SA-01194 (CVE-2024-37020)
It also fixes:
- unspecified functional issues on several processors
There are no releavant issues reported on this microcode update,
considering the version of intel-microcode already available as security
updates for Bookworm.
[ Impact ]
If this update is not approved, owners of most recent "client" Intel
processors and a few server processors will depend on UEFI updates to be
protected from the issues listed above.
[ Tests ]
There were no bug reports from users of Debian sid or Trixie, these
packages have been tested there since 2025-02-16 (sid), 2025-02-22
(trixie).
[ Risks ]
Unknown, but not believed to be any different from other Intel microcode
updates.
[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable
[ Changes ]
As per the debdiff, only documentation changes, package documentation
changes, and the binary blob change from upstream.
b/changelog | 71 +++++++++++++++++++++++++++++++++++++++++
b/debian/changelog | 83 +++++++++++++++++++++++++++++++++++++++++++++++++
b/intel-ucode/06-6a-06 |binary
b/intel-ucode/06-6c-01 |binary
b/intel-ucode/06-8f-07 |binary
b/intel-ucode/06-8f-08 |binary
b/intel-ucode/06-97-02 |binary
b/intel-ucode/06-97-05 |binary
b/intel-ucode/06-9a-03 |binary
b/intel-ucode/06-9a-04 |binary
b/intel-ucode/06-9e-0a |binary
b/intel-ucode/06-9e-0d |binary
b/intel-ucode/06-a7-01 |binary
b/intel-ucode/06-af-03 |binary
b/intel-ucode/06-b7-01 |binary
b/intel-ucode/06-ba-02 |binary
b/intel-ucode/06-ba-03 |binary
b/intel-ucode/06-be-00 |binary
b/intel-ucode/06-bf-02 |binary
b/intel-ucode/06-bf-05 |binary
b/intel-ucode/06-cf-01 |binary
b/intel-ucode/06-cf-02 |binary
b/releasenote.md | 62 ++++++++++++++++++++++++++++++++++++
24 files changed, 216 insertions(+)
[ Other info ]
The package version with "~" is needed to guarantee smooth updates to
the next debian release.
--
Henrique Holschuh
diff --git a/changelog b/changelog
index a611986..50af05b 100644
--- a/changelog
+++ b/changelog
@@ -1,3 +1,68 @@
+2025-02-11:
+ * New upstream microcode datafile 20250211
+ - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
+ Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
+ Processors may allow privileged user to potentially enable denial of
+ service via local access.
+ - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+ Improper access control in the EDECCSSA user leaf function for some
+ Intel Processors with Intel SGX may allow an authenticated user to
+ potentially enable denial of service via local access. Intel disclosed
+ that some 9th Generation Intel Core processor models were already fixed
+ by a previous microcode update.
+ - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
+ CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
+ CVE-2024-31157, CVE-2024-28047)
+ Improper input validation, insufficient granularity of access control,
+ and improper initialization issues in UEFI firmware for some Intel
+ processors may allow escalation of privilege, denial of service, or
+ information disclosure. An UEFI firmware update is needed for complete
+ mitigation.
+ - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
+ Improper handling of physical or environmental conditions in some 13th
+ and 14th Generation Intel Core Processors may allow an authenticated
+ user to enable denial of service via local access. An UEFI firmware
+ update may be required for complete mitigation.
+ - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
+ Sequence of processor instructions leads to unexpected behavior in the
+ Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
+ user to potentially enable denial of service via local access.
+ - Fixes for unspecified functional issues on several processor models
+ * New microcodes or new extended signatures:
+ sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
+ sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+ sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+ sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+ * Updated microcodes:
+ sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
+ sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
+ sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
+ sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
+ sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+ sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+ sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+ sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+ sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
+ sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
+ sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
+ sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
+ sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
+ sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
+ sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
+ sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
+ sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
+ sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+ sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
+ sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
+ sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
+ sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
+ sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
+ sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
+
2024-11-12:
* New upstream microcode datafile 20241112
- Mitigations for INTEL-SA-01101 (CVE-2024-21853)
@@ -108,6 +173,12 @@
disclosure. Intel released this information during the full disclosure
for the 20240910 update. Processor signatures 0x5065b, 0x606a6,
0x606c1.
+ - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+ Improper access control in the EDECCSSA user leaf function for some
+ Intel Processors with Intel SGX may allow an authenticated user to
+ potentially enable denial of service via local access. Intel released
+ this information during the full disclosure for the 20250211 update.
+ Processor signature 0x906ec (9th Generation Intel Core processor).
- Fix for unspecified functional issues on several processor models
- Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
microcode update". It is not clear which processors were fixed by this
diff --git a/debian/changelog b/debian/changelog
index 3d0dc0d..3a251c5 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,80 @@
+intel-microcode (3.20250211.1~deb12u1) bookworm; urgency=medium
+
+ * Build for bookworm
+ * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+ -- Henrique de Moraes Holschuh <h...@debian.org> Sat, 08 Mar 2025 09:15:30 -0300
+
+intel-microcode (3.20250211.1) unstable; urgency=medium
+
+ * New upstream microcode datafile 20250211 (closes: #1095805)
+ - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
+ Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
+ Processors may allow privileged user to potentially enable denial of
+ service via local access.
+ - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+ Improper access control in the EDECCSSA user leaf function for some
+ Intel Processors with Intel SGX may allow an authenticated user to
+ potentially enable denial of service via local access. Intel disclosed
+ that some 9th Generation Intel Core processor models were already fixed
+ by a previous microcode update.
+ - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
+ CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
+ CVE-2024-31157, CVE-2024-28047)
+ Improper input validation, insufficient granularity of access control,
+ and improper initialization issues in UEFI firmware for some Intel
+ processors may allow escalation of privilege, denial of service, or
+ information disclosure. An UEFI firmware update is needed for complete
+ mitigation.
+ - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
+ Improper handling of physical or environmental conditions in some 13th
+ and 14th Generation Intel Core Processors may allow an authenticated
+ user to enable denial of service via local access. An UEFI firmware
+ update may be required for complete mitigation.
+ - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
+ Sequence of processor instructions leads to unexpected behavior in the
+ Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
+ user to potentially enable denial of service via local access.
+ - Fixes for unspecified functional issues on several processor models
+ * New microcodes or new extended signatures:
+ sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
+ sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+ sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+ sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+ * Updated microcodes:
+ sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
+ sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
+ sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
+ sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+ sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
+ sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+ sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+ sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+ sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+ sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
+ sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
+ sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
+ sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
+ sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
+ sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
+ sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
+ sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
+ sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
+ sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+ sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
+ sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
+ sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
+ sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
+ sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
+ sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
+ * source: update symlinks to reflect id of the latest release, 20250211
+ * Update changelog for 3.20240813.1 with new information
+
+ -- Henrique de Moraes Holschuh <h...@debian.org> Sun, 16 Feb 2025 18:34:38 -0300
+
intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium
* Build for bookworm
@@ -150,6 +227,12 @@ intel-microcode (3.20240813.1) unstable; urgency=medium
- Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
microcode update". It is not clear which processors were fixed by this
release, or by one of the microcode updates from 2024-05.
+ - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+ Improper access control in the EDECCSSA user leaf function for some
+ Intel Processors with Intel SGX may allow an authenticated user to
+ potentially enable denial of service via local access. Intel released
+ this information during the full disclosure for the 20250211 update.
+ Processor signature 0x906ec (9th Generation Intel Core processor).
* Updated microcodes:
sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936
sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720
diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06
index 7a2cb68..d4a366f 100644
Binary files a/intel-ucode/06-6a-06 and b/intel-ucode/06-6a-06 differ
diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01
index 019a72a..1676c98 100644
Binary files a/intel-ucode/06-6c-01 and b/intel-ucode/06-6c-01 differ
diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05
deleted file mode 100644
index 34b14f1..0000000
Binary files a/intel-ucode/06-8f-05 and /dev/null differ
diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06
deleted file mode 100644
index 34b14f1..0000000
Binary files a/intel-ucode/06-8f-06 and /dev/null differ
diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07
index 803094c..ba8c8fd 100644
Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ
diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08
index 34b14f1..7bc6a8f 100644
Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ
diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ
diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ
diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03
index d60fc12..fe20c2c 100644
Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ
diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04
index f1f5fc6..0268fc4 100644
Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ
diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a
index ccbd25f..7eb1a98 100644
Binary files a/intel-ucode/06-9e-0a and b/intel-ucode/06-9e-0a differ
diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d
index b4916c0..949389d 100644
Binary files a/intel-ucode/06-9e-0d and b/intel-ucode/06-9e-0d differ
diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01
index cdd4d65..32eeaac 100644
Binary files a/intel-ucode/06-a7-01 and b/intel-ucode/06-a7-01 differ
diff --git a/intel-ucode/06-af-03 b/intel-ucode/06-af-03
new file mode 100644
index 0000000..9629bae
Binary files /dev/null and b/intel-ucode/06-af-03 differ
diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01
index d57fa9d..a0b16ee 100644
Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ
diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02
index 19c9647..7359151 100644
Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ
diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03
index 19c9647..7359151 100644
Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ
diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08
deleted file mode 100644
index 19c9647..0000000
Binary files a/intel-ucode/06-ba-08 and /dev/null differ
diff --git a/intel-ucode/06-be-00 b/intel-ucode/06-be-00
index 5316c7e..2a61c4a 100644
Binary files a/intel-ucode/06-be-00 and b/intel-ucode/06-be-00 differ
diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ
diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ
diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01
index 4f47576..937187a 100644
Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ
diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02
index 4f47576..937187a 100644
Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ
diff --git a/microcode-20241112.d b/microcode-20250211.d
similarity index 100%
rename from microcode-20241112.d
rename to microcode-20250211.d
diff --git a/releasenote.md b/releasenote.md
index 1c417fa..300576b 100644
--- a/releasenote.md
+++ b/releasenote.md
@@ -1,4 +1,66 @@
# Release Notes
+## [microcode-20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01166](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html)
+- Security updates for [INTEL-SA-01213](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html)
+- Security updates for [INTEL-SA-01139](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html)
+- Security updates for [INTEL-SA-01228](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html)
+- Security updates for [INTEL-SA-01194](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html)
+
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [13th/14th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
+- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
+- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
+- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
+- Update for functional issues. Refer to [Intel® Xeon® 6700-Series Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/820922) for details.
+- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details
+
+### New Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| SRF-SP | C0 | 06-af-03/01 | | 03000330 | Xeon 6700-Series Processors with E-Cores
+
+### Updated Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL | C0 | 06-97-02/07 | 00000037 | 00000038 | Core Gen12
+| ADL | H0 | 06-97-05/07 | 00000037 | 00000038 | Core Gen12
+| ADL | L0 | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12
+| ADL | R0 | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12
+| ADL-N | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+| AZB | A0/R0 | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100
+| CFL-H | R0 | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile
+| CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E
+| EMR-SP | A0 | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5
+| EMR-SP | A1 | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5
+| ICL-D | B0 | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx
+| ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3
+| RPL-E/HX/S | B0 | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14
+| RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13
+| RPL-HX/S | C0 | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14
+| RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13
+| RPL-S | H0 | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14
+| RKL-S | B0 | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11
+| SPR-HBM | Bx | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max
+| SPR-SP | E4/S2 | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4
+| SPR-SP | E5/S3 | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4
+| TWL | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+
+### New Disclosures Updated in Prior Releases
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| CFL-H/S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
+
## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112)
### Purpose
diff --git a/supplementary-ucode-20241112_BDX-ML.bin b/supplementary-ucode-20250211_BDX-ML.bin
similarity index 100%
rename from supplementary-ucode-20241112_BDX-ML.bin
rename to supplementary-ucode-20250211_BDX-ML.bin
signature.asc
Description: PGP signature
--- End Message ---