UbuntuUpdates.org

Package "intel-microcode"

Name: intel-microcode

Description:

Processor microcode firmware for Intel CPUs

Latest version: 3.20250512.0ubuntu0.20.04.1
Release: focal (20.04)
Level: security
Repository: main
Homepage: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files

Links


Download "intel-microcode"


Other versions of "intel-microcode" in Focal

Repository Area Version
base main 3.20191115.1ubuntu3
updates main 3.20250512.0ubuntu0.20.04.1

Changelog

Version: 3.20250512.0ubuntu0.20.04.1 2025-05-27 12:07:24 UTC

  intel-microcode (3.20250512.0ubuntu0.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20250512
    - New microcodes:
      sig 0x000a06d1, pf_mask 0x20, 2025-02-07, rev 0xa0000d1, size 1635328
      sig 0x000a06d1, pf_mask 0x95, 2025-02-07, rev 0x10003a2, size 1664000
      sig 0x000b0650, pf_mask 0x80, 2025-03-18, rev 0x000a, size 136192
      sig 0x000b06d1, pf_mask 0x80, 2025-03-18, rev 0x011f, size 79872
      sig 0x000c0652, pf_mask 0x82, 2025-03-20, rev 0x0118, size 90112
      sig 0x000c0662, pf_mask 0x82, 2025-03-20, rev 0x0118, size 90112
      sig 0x000c0664, pf_mask 0x82, 2025-03-20, rev 0x0118, size 90112
      sig 0x000c06a2, pf_mask 0x82, 2025-03-20, rev 0x0118, size 90112
    - Updated microcodes:
      sig 0x00050657, pf_mask 0xbf, 2024-12-12, rev 0x5003901, size 39936
      sig 0x0005065b, pf_mask 0xbf, 2024-12-12, rev 0x7002b01, size 30720
      sig 0x000606a6, pf_mask 0x87, 2025-01-07, rev 0xd000404, size 309248
      sig 0x000606c1, pf_mask 0x10, 2025-01-07, rev 0x10002d0, size 300032
      sig 0x000706a8, pf_mask 0x01, 2024-12-05, rev 0x0026, size 76800
      sig 0x000706e5, pf_mask 0x80, 2025-01-07, rev 0x00ca, size 115712
      sig 0x000806c1, pf_mask 0x80, 2024-12-01, rev 0x00bc, size 112640
      sig 0x000806c2, pf_mask 0xc2, 2024-12-01, rev 0x003c, size 99328
      sig 0x000806d1, pf_mask 0xc2, 2024-12-11, rev 0x0056, size 105472
      sig 0x000806ec, pf_mask 0x94, 2024-11-17, rev 0x0100, size 106496
      sig 0x000806f4, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7, size 624640
      sig 0x000806f4, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
      sig 0x000806f5, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7, size 624640
      sig 0x000806f5, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
      sig 0x000806f6, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7, size 624640
      sig 0x000806f6, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
      sig 0x000806f7, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
      sig 0x000806f8, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7, size 624640
      sig 0x000806f8, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
      sig 0x00090672, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
      sig 0x00090675, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
      sig 0x000906a3, pf_mask 0x80, 2024-12-12, rev 0x0437, size 224256
      sig 0x000906a4, pf_mask 0x40, 2024-12-06, rev 0x000a, size 119808
      sig 0x000906a4, pf_mask 0x80, 2024-12-12, rev 0x0437, size 224256
      sig 0x000906ed, pf_mask 0x22, 2024-11-14, rev 0x0104, size 106496
      sig 0x000a0652, pf_mask 0x20, 2024-11-14, rev 0x0100, size 97280
      sig 0x000a0653, pf_mask 0x22, 2024-11-14, rev 0x0100, size 98304
      sig 0x000a0655, pf_mask 0x22, 2024-11-14, rev 0x0100, size 97280
      sig 0x000a0660, pf_mask 0x80, 2024-11-14, rev 0x0102, size 98304
      sig 0x000a0661, pf_mask 0x80, 2024-11-14, rev 0x0100, size 97280
      sig 0x000a0671, pf_mask 0x02, 2024-12-01, rev 0x0064, size 108544
      sig 0x000a06a4, pf_mask 0xe6, 2025-02-13, rev 0x0024, size 140288
      sig 0x000a06f3, pf_mask 0x01, 2025-02-10, rev 0x3000341, size 1542144
      sig 0x000b0671, pf_mask 0x32, 2025-03-17, rev 0x012f, size 219136
      sig 0x000b0674, pf_mask 0x32, 2025-03-17, rev 0x012f, size 219136
      sig 0x000b06a2, pf_mask 0xe0, 2025-01-15, rev 0x4128, size 224256
      sig 0x000b06a3, pf_mask 0xe0, 2025-01-15, rev 0x4128, size 224256
      sig 0x000b06a8, pf_mask 0xe0, 2025-01-15, rev 0x4128, size 224256
      sig 0x000b06e0, pf_mask 0x19, 2024-12-06, rev 0x001d, size 139264
      sig 0x000b06f2, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
      sig 0x000b06f5, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
      sig 0x000b06f6, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
      sig 0x000b06f7, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
      sig 0x000c06f1, pf_mask 0x87, 2025-03-14, rev 0x210002a9, size 563200
      sig 0x000c06f2, pf_mask 0x87, 2025-03-14, rev 0x210002a9, size 563200
    - Removed microcodes:
      sig 0x00050656, pf_mask 0xbf, 2023-07-28, rev 0x4003605, size 38912
    - CVE-2024-28956 (INTEL-SA-01153)
    - CVE-2025-20054 (INTEL-SA-01244)
    - CVE-2025-20103 (INTEL-SA-01244)
    - CVE-2024-43420 (INTEL-SA-01247)
    - CVE-2024-45332 (INTEL-SA-01247)
    - CVE-2025-20623 (INTEL-SA-01247)
    - CVE-2025-20012 (INTEL-SA-01322)
    - CVE-2025-24495 (INTEL-SA-01322)
  * Makefile: exclude QS/ES steppings 0x50656, 0xc06f1.
  * Makefile: add targets to create split F-M-S /lib/firmware dir
  * debian/rules: use new intel-ucode-{fw,fw64} Makefile targets
    Removes from the binary package the F-M-S files for extended signatures
    that were excluded by IUC_EXCLUDE.
  * source: update symlinks to reflect id of the latest release, 20250512

 -- Eduardo Barretto <email address hidden> Thu, 22 May 2025 17:22:32 +0200

Source diff to previous version
CVE-2024-28956 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authen
CVE-2025-20054 Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of serv
CVE-2025-20103 Insufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial
CVE-2024-43420 Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) proc
CVE-2024-45332 Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch pred
CVE-2025-20623 Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core™ pro
CVE-2025-20012 Incorrect behavior order for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via
CVE-2025-24495 Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potent

Version: 3.20250211.0ubuntu0.20.04.1 2025-02-17 12:06:51 UTC

  intel-microcode (3.20250211.0ubuntu0.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20250211
    - New microcodes:
      sig 0x000a06f3, pf_mask 0x01, 2024-11-22, rev 0x3000330, size 1533952
      sig 0x000b0674, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
      sig 0x000b06f6, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
      sig 0x000b06f7, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
    - Updated microcodes:
      sig 0x000606a6, pf_mask 0x87, 2024-08-02, rev 0xd0003f5, size 308224
      sig 0x000606c1, pf_mask 0x10, 2024-08-08, rev 0x10002c0, size 300032
      sig 0x000806f4, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
      sig 0x000806f4, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
      sig 0x000806f5, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
      sig 0x000806f5, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
      sig 0x000806f6, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
      sig 0x000806f6, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
      sig 0x000806f7, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
      sig 0x000806f8, pf_mask 0x10, 2024-07-30, rev 0x2c0003e0, size 622592
      sig 0x000806f8, pf_mask 0x87, 2024-07-30, rev 0x2b000620, size 589824
      sig 0x00090672, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
      sig 0x00090675, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
      sig 0x000906a3, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
      sig 0x000906a4, pf_mask 0x40, 2024-07-29, rev 0x0009, size 119808
      sig 0x000906a4, pf_mask 0x80, 2024-08-01, rev 0x0436, size 223232
      sig 0x000906ea, pf_mask 0x22, 2024-07-28, rev 0x00fa, size 105472
      sig 0x000906ed, pf_mask 0x22, 2024-07-31, rev 0x0102, size 106496
      sig 0x000a0671, pf_mask 0x02, 2024-08-01, rev 0x0063, size 108544
      sig 0x000b0671, pf_mask 0x32, 2024-09-25, rev 0x012c, size 211968
      sig 0x000b06a2, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
      sig 0x000b06a8, pf_mask 0xe0, 2024-07-31, rev 0x4124, size 220160
      sig 0x000b06e0, pf_mask 0x19, 2024-09-06, rev 0x001c, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
      sig 0x000b06f5, pf_mask 0x07, 2024-08-01, rev 0x0038, size 225280
      sig 0x000c06f1, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
      sig 0x000c06f2, pf_mask 0x87, 2024-07-30, rev 0x21000291, size 560128
    - CVE-2024-31068 (INTEL-SA-01166)
    - CVE-2024-36293 (INTEL-SA-01213)
    - CVE-2024-39279 (INTEL-SA-01139)
  * source: update symlinks to reflect id of the latest release, 20250211

 -- Alex Murray <email address hidden> Wed, 12 Feb 2025 10:54:55 +1030

Source diff to previous version
CVE-2024-31068 Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of servic
CVE-2024-36293 Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentia
CVE-2024-39279 Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial o

Version: 3.20241112.0ubuntu0.20.04.1 2024-12-11 02:06:49 UTC

  intel-microcode (3.20241112.0ubuntu0.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20241112
    - Updated microcodes:
      sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
      sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
      sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
      sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
      sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
      sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
      sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
      sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
    - CVE-2024-21853 (INTEL-SA-01101)
    - CVE-2024-23918 (INTEL-SA-01079)
    - CVE-2024-21820 (INTEL-SA-01079)
    - CVE-2024-24968 (INTEL-SA-01097)
    - CVE-2024-23984 (INTEL-SA-01103)
  * source: update symlinks to reflect id of the latest release, 20241112

 -- Alex Murray <email address hidden> Mon, 09 Dec 2024 14:23:47 +1030

Source diff to previous version
CVE-2024-21853 Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user t
CVE-2024-23918 Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to
CVE-2024-21820 Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user
CVE-2024-24968 Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of se
CVE-2024-23984 Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via lo

Version: 3.20240910.0ubuntu0.20.04.1 2024-09-25 04:06:56 UTC

  intel-microcode (3.20240910.0ubuntu0.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20240910
    - Updated microcodes:
      sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
      sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
      sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216
      sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040
      sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
    - CVE-2024-23984 (INTEL-SA-01103)
    - CVE-2024-24968 (INTEL-SA-01097)
  * source: update symlinks to reflect id of the latest release, 20240910

 -- Alex Murray <email address hidden> Thu, 12 Sep 2024 10:19:45 +0930

Source diff to previous version
CVE-2024-23984 Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via lo
CVE-2024-24968 Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of se

Version: 3.20240813.0ubuntu0.20.04.2 2024-08-19 08:07:10 UTC

  intel-microcode (3.20240813.0ubuntu0.20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: Respin based on newly retagged upstream microcode
    datafile 20240813
    - Updated microcodes:
      sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304
    - CVE-2024-24853 (INTEL-SA-01083)
    - CVE-2024-25939 (INTEL-SA-01118)
    - CVE-2024-24980 (INTEL-SA-01100)
    - CVE-2023-42667 (INTEL-SA-01038)
    - CVE-2023-49141 (INTEL-SA-01046)

CVE-2024-24853 Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged use
CVE-2024-25939 Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denia
CVE-2024-24980 Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escal
CVE-2023-42667 Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation o
CVE-2023-49141 Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege v



About   -   Send Feedback to @ubuntu_updates