UbuntuUpdates.org

Package "amd64-microcode"

Name: amd64-microcode

Description:

Processor microcode firmware for AMD CPUs

Latest version: 3.20191218.1ubuntu1.3
Release: focal (20.04)
Level: security
Repository: main

Links


Download "amd64-microcode"


Other versions of "amd64-microcode" in Focal

Repository Area Version
base main 3.20191218.1ubuntu1
updates main 3.20191218.1ubuntu1.3

Changelog

Version: 3.20191218.1ubuntu1.3 2024-10-21 02:06:54 UTC

  amd64-microcode (3.20191218.1ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via improper MSR access
    - amd-ucode/microcode_amd_fam{17,19}h.bin{,.asc}: add updated AMD
      fam17h and fam19h CPU microcodes
    - Updated microcodes:
      Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f Length=3200 bytes
      Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c Length=3200 bytes
      Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a Length=5568 bytes
      Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 Length=5568 bytes
      Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 Length=5568 bytes
      Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 Length=5568 bytes
      Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 Length=5568 bytes
      Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 Length=5568 bytes
    - CVE-2023-31315

 -- Alex Murray <email address hidden> Wed, 16 Oct 2024 15:53:30 +1030

Source diff to previous version
CVE-2023-31315 Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock i

Version: 3.20191218.1ubuntu1.2 2023-08-30 03:07:53 UTC

  amd64-microcode (3.20191218.1ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: INCEPTION - information leak via speculative execution
    - amd-ucode/microcode_amd_fam19h.bin{.asc}: add AMD fam19h cpu
      microcode and signature for Inception vulnerability
    - New microcodes:
      Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079 Length=5568 bytes
      Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d1 Length=5568 bytes
      Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001234 Length=5568 bytes
      Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a10113e Length=5568 bytes
      Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e Length=5568 bytes
      Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116 Length=5568 bytes
      Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212 Length=5568 bytes
    - CVE-2023-20569

 -- Alex Murray <email address hidden> Mon, 21 Aug 2023 10:26:27 +0930

Source diff to previous version

Version: 3.20191218.1ubuntu1.1 2023-07-25 15:07:06 UTC

  amd64-microcode (3.20191218.1ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: Zenbleed - information leak via speculative execution
    - microcode_amd_fam17h.bin{.asc}: update AMD fam17h cpu microcode and
      signature for Zenbleed vulnerability
    - New microcodes:
      + Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a Length=3200 bytes
      + Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008 Length=3200 bytes
    - Updated microcodes:
      + Family=0x17 Model=0x08 Stepping=0x02: Patch=0x0800820d Length=3200 bytes
      + Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126e Length=3200 bytes
    - CVE-2023-20593

 -- Alex Murray <email address hidden> Tue, 25 Jul 2023 13:47:45 +0930

CVE-2023-20593 An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural ...



About   -   Send Feedback to @ubuntu_updates