Your message dated Sat, 15 Mar 2025 09:44:44 +0000
with message-id <e1tto4s-005kjy...@coccia.debian.org>
and subject line Close 1099814
has caused the Debian Bug report #1099814,
regarding bookworm-pu: package intel-microcode/3.20250211.1~deb12u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1099814: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099814
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu

[ Reason ]

As requested by the security team, I would like to bring the microcode
update level for Intel processors in Bookworm to match what we have in Sid
and Trixie.

This adds or updates:
  - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
  - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
  - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
    CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
    CVE-2024-31157, CVE-2024-28047)
  - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
  - Mitigations for INTEL-SA-01194 (CVE-2024-37020)

It also fixes:
  - unspecified functional issues on several processors

There are no releavant issues reported on this microcode update,
considering the version of intel-microcode already available as security
updates for Bookworm.

[ Impact ]

If this update is not approved, owners of most recent "client" Intel
processors and a few server processors will depend on UEFI updates to be
protected from the issues listed above.

[ Tests ]

There were no bug reports from users of Debian sid or Trixie, these
packages have been tested there since 2025-02-16 (sid), 2025-02-22
(trixie).

[ Risks ]

Unknown, but not believed to be any different from other Intel microcode
updates.

[ Checklist ]

  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

As per the debdiff, only documentation changes, package documentation
changes, and the binary blob change from upstream.

 b/changelog            |   71 +++++++++++++++++++++++++++++++++++++++++
 b/debian/changelog     |   83 +++++++++++++++++++++++++++++++++++++++++++++++++
 b/intel-ucode/06-6a-06 |binary
 b/intel-ucode/06-6c-01 |binary
 b/intel-ucode/06-8f-07 |binary
 b/intel-ucode/06-8f-08 |binary
 b/intel-ucode/06-97-02 |binary
 b/intel-ucode/06-97-05 |binary
 b/intel-ucode/06-9a-03 |binary
 b/intel-ucode/06-9a-04 |binary
 b/intel-ucode/06-9e-0a |binary
 b/intel-ucode/06-9e-0d |binary
 b/intel-ucode/06-a7-01 |binary
 b/intel-ucode/06-af-03 |binary
 b/intel-ucode/06-b7-01 |binary
 b/intel-ucode/06-ba-02 |binary
 b/intel-ucode/06-ba-03 |binary
 b/intel-ucode/06-be-00 |binary
 b/intel-ucode/06-bf-02 |binary
 b/intel-ucode/06-bf-05 |binary
 b/intel-ucode/06-cf-01 |binary
 b/intel-ucode/06-cf-02 |binary
 b/releasenote.md       |   62 ++++++++++++++++++++++++++++++++++++
 24 files changed, 216 insertions(+)

[ Other info ]

The package version with "~" is needed to guarantee smooth updates to
the next debian release.

-- 
  Henrique Holschuh
diff --git a/changelog b/changelog
index a611986..50af05b 100644
--- a/changelog
+++ b/changelog
@@ -1,3 +1,68 @@
+2025-02-11:
+  * New upstream microcode datafile 20250211
+    - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
+      Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
+      Processors may allow privileged user to potentially enable denial of
+      service via local access.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel disclosed
+      that some 9th Generation Intel Core processor models were already fixed
+      by a previous microcode update.
+    - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
+      CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
+      CVE-2024-31157, CVE-2024-28047)
+      Improper input validation, insufficient granularity of access control,
+      and improper initialization issues in UEFI firmware for some Intel
+      processors may allow escalation of privilege, denial of service, or
+      information disclosure.  An UEFI firmware update is needed for complete
+      mitigation.
+    - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
+      Improper handling of physical or environmental conditions in some 13th
+      and 14th Generation Intel Core Processors may allow an authenticated
+      user to enable denial of service via local access.  An UEFI firmware
+      update may be required for complete mitigation.
+    - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
+      Sequence of processor instructions leads to unexpected behavior in the
+      Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
+      user to potentially enable denial of service via local access.
+    - Fixes for unspecified functional issues on several processor models
+  * New microcodes or new extended signatures:
+    sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
+    sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+  * Updated microcodes:
+    sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
+    sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
+    sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
+    sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
+    sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
+    sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
+    sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
+    sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
+    sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
+    sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+    sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
+    sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
+
 2024-11-12:
   * New upstream microcode datafile 20241112
     - Mitigations for INTEL-SA-01101 (CVE-2024-21853)
@@ -108,6 +173,12 @@
       disclosure.  Intel released this information during the full disclosure
       for the 20240910 update.  Processor signatures 0x5065b, 0x606a6,
       0x606c1.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel released
+      this information during the full disclosure for the 20250211 update.
+      Processor signature 0x906ec (9th Generation Intel Core processor).
     - Fix for unspecified functional issues on several processor models
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
diff --git a/debian/changelog b/debian/changelog
index 3d0dc0d..3a251c5 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,80 @@
+intel-microcode (3.20250211.1~deb12u1) bookworm; urgency=medium
+
+  * Build for bookworm
+  * All trixie-only changes (from 3.20240813.2) are reverted on this branch
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sat, 08 Mar 2025 09:15:30 -0300
+
+intel-microcode (3.20250211.1) unstable; urgency=medium
+
+  * New upstream microcode datafile 20250211 (closes: #1095805)
+    - Mitigations for INTEL-SA-01166 (CVE-2024-31068)
+      Improper Finite State Machines (FSMs) in Hardware Logic for some Intel
+      Processors may allow privileged user to potentially enable denial of
+      service via local access.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel disclosed
+      that some 9th Generation Intel Core processor models were already fixed
+      by a previous microcode update.
+    - Mitigations for INTEL-SA-01139 (CVE-2023-43758, CVE-2023-34440,
+      CVE-2024-24582, CVE-2024-29214, CVE-2024-28127, CVE-2024-39279,
+      CVE-2024-31157, CVE-2024-28047)
+      Improper input validation, insufficient granularity of access control,
+      and improper initialization issues in UEFI firmware for some Intel
+      processors may allow escalation of privilege, denial of service, or
+      information disclosure.  An UEFI firmware update is needed for complete
+      mitigation.
+    - Mitigations for INTEL-SA-01228 (CVE-2024-39355)
+      Improper handling of physical or environmental conditions in some 13th
+      and 14th Generation Intel Core Processors may allow an authenticated
+      user to enable denial of service via local access.  An UEFI firmware
+      update may be required for complete mitigation.
+    - Mitigations for INTEL-SA-01194 (CVE-2024-37020)
+      Sequence of processor instructions leads to unexpected behavior in the
+      Intel DSA V1.0 for some Intel Xeon Processors may allow an authenticated
+      user to potentially enable denial of service via local access.
+    - Fixes for unspecified functional issues on several processor models
+  * New microcodes or new extended signatures:
+    sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
+    sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+  * Updated microcodes:
+    sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
+    sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
+    sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
+    sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620
+    sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
+    sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0
+    sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
+    sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038
+    sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
+    sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436
+    sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
+    sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
+    sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
+    sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
+    sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
+    sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
+    sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124
+    sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
+    sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
+    sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291
+  * source: update symlinks to reflect id of the latest release, 20250211
+  * Update changelog for 3.20240813.1 with new information
+
+ -- Henrique de Moraes Holschuh <h...@debian.org>  Sun, 16 Feb 2025 18:34:38 -0300
+
 intel-microcode (3.20241112.1~deb12u1) bookworm; urgency=medium
 
   * Build for bookworm
@@ -150,6 +227,12 @@ intel-microcode (3.20240813.1) unstable; urgency=medium
     - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a
       microcode update".  It is not clear which processors were fixed by this
       release, or by one of the microcode updates from 2024-05.
+    - Mitigations for INTEL-SA-01213 (CVE-2024-36293)
+      Improper access control in the EDECCSSA user leaf function for some
+      Intel Processors with Intel SGX may allow an authenticated user to
+      potentially enable denial of service via local access.  Intel released
+      this information during the full disclosure for the 20250211 update.
+      Processor signature 0x906ec (9th Generation Intel Core processor).
   * Updated microcodes:
     sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936
     sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720
diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06
index 7a2cb68..d4a366f 100644
Binary files a/intel-ucode/06-6a-06 and b/intel-ucode/06-6a-06 differ
diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01
index 019a72a..1676c98 100644
Binary files a/intel-ucode/06-6c-01 and b/intel-ucode/06-6c-01 differ
diff --git a/intel-ucode/06-8f-05 b/intel-ucode/06-8f-05
deleted file mode 100644
index 34b14f1..0000000
Binary files a/intel-ucode/06-8f-05 and /dev/null differ
diff --git a/intel-ucode/06-8f-06 b/intel-ucode/06-8f-06
deleted file mode 100644
index 34b14f1..0000000
Binary files a/intel-ucode/06-8f-06 and /dev/null differ
diff --git a/intel-ucode/06-8f-07 b/intel-ucode/06-8f-07
index 803094c..ba8c8fd 100644
Binary files a/intel-ucode/06-8f-07 and b/intel-ucode/06-8f-07 differ
diff --git a/intel-ucode/06-8f-08 b/intel-ucode/06-8f-08
index 34b14f1..7bc6a8f 100644
Binary files a/intel-ucode/06-8f-08 and b/intel-ucode/06-8f-08 differ
diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-97-02 and b/intel-ucode/06-97-02 differ
diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-97-05 and b/intel-ucode/06-97-05 differ
diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03
index d60fc12..fe20c2c 100644
Binary files a/intel-ucode/06-9a-03 and b/intel-ucode/06-9a-03 differ
diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04
index f1f5fc6..0268fc4 100644
Binary files a/intel-ucode/06-9a-04 and b/intel-ucode/06-9a-04 differ
diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a
index ccbd25f..7eb1a98 100644
Binary files a/intel-ucode/06-9e-0a and b/intel-ucode/06-9e-0a differ
diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d
index b4916c0..949389d 100644
Binary files a/intel-ucode/06-9e-0d and b/intel-ucode/06-9e-0d differ
diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01
index cdd4d65..32eeaac 100644
Binary files a/intel-ucode/06-a7-01 and b/intel-ucode/06-a7-01 differ
diff --git a/intel-ucode/06-af-03 b/intel-ucode/06-af-03
new file mode 100644
index 0000000..9629bae
Binary files /dev/null and b/intel-ucode/06-af-03 differ
diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01
index d57fa9d..a0b16ee 100644
Binary files a/intel-ucode/06-b7-01 and b/intel-ucode/06-b7-01 differ
diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02
index 19c9647..7359151 100644
Binary files a/intel-ucode/06-ba-02 and b/intel-ucode/06-ba-02 differ
diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03
index 19c9647..7359151 100644
Binary files a/intel-ucode/06-ba-03 and b/intel-ucode/06-ba-03 differ
diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08
deleted file mode 100644
index 19c9647..0000000
Binary files a/intel-ucode/06-ba-08 and /dev/null differ
diff --git a/intel-ucode/06-be-00 b/intel-ucode/06-be-00
index 5316c7e..2a61c4a 100644
Binary files a/intel-ucode/06-be-00 and b/intel-ucode/06-be-00 differ
diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-bf-02 and b/intel-ucode/06-bf-02 differ
diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05
index 68441d5..600a5ee 100644
Binary files a/intel-ucode/06-bf-05 and b/intel-ucode/06-bf-05 differ
diff --git a/intel-ucode/06-cf-01 b/intel-ucode/06-cf-01
index 4f47576..937187a 100644
Binary files a/intel-ucode/06-cf-01 and b/intel-ucode/06-cf-01 differ
diff --git a/intel-ucode/06-cf-02 b/intel-ucode/06-cf-02
index 4f47576..937187a 100644
Binary files a/intel-ucode/06-cf-02 and b/intel-ucode/06-cf-02 differ
diff --git a/microcode-20241112.d b/microcode-20250211.d
similarity index 100%
rename from microcode-20241112.d
rename to microcode-20250211.d
diff --git a/releasenote.md b/releasenote.md
index 1c417fa..300576b 100644
--- a/releasenote.md
+++ b/releasenote.md
@@ -1,4 +1,66 @@
 # Release Notes
+## [microcode-20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01166](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html)
+- Security updates for [INTEL-SA-01213](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html)
+- Security updates for [INTEL-SA-01139](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html)
+- Security updates for [INTEL-SA-01228](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html)
+- Security updates for [INTEL-SA-01194](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html)
+
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [13th/14th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
+- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
+- Update for functional issues. Refer to [5th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details.
+- Update for functional issues. Refer to [4th Gen Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
+- Update for functional issues. Refer to [Intel® Xeon® 6700-Series Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/820922) for details.
+- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details
+
+### New Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| SRF-SP         | C0       | 06-af-03/01 |          | 03000330 | Xeon 6700-Series Processors with E-Cores
+
+### Updated Platforms
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL            | C0       | 06-97-02/07 | 00000037 | 00000038 | Core Gen12
+| ADL            | H0       | 06-97-05/07 | 00000037 | 00000038 | Core Gen12
+| ADL            | L0       | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12
+| ADL            | R0       | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12
+| ADL-N          | N0       | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+| AZB            | A0/R0    | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100
+| CFL-H          | R0       | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile
+| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E
+| EMR-SP         | A0       | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5
+| EMR-SP         | A1       | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5
+| ICL-D          | B0       | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx
+| ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3
+| RPL-E/HX/S     | B0       | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14
+| RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13
+| RPL-HX/S       | C0       | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14
+| RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13
+| RPL-S          | H0       | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14
+| RKL-S          | B0       | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11
+| SPR-HBM        | Bx       | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max
+| SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 
+| SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4
+| TWL            | N0       | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+
+### New Disclosures Updated in Prior Releases
+
+| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| CFL-H/S        | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
+
 ## [microcode-20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112)
 
 ### Purpose
diff --git a/supplementary-ucode-20241112_BDX-ML.bin b/supplementary-ucode-20250211_BDX-ML.bin
similarity index 100%
rename from supplementary-ucode-20241112_BDX-ML.bin
rename to supplementary-ucode-20250211_BDX-ML.bin

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 12.10
This update has been released as part of 12.10. Thank you for your contribution.

--- End Message ---

Reply via email to