Package "amd64-microcode"
Name: |
amd64-microcode
|
Description: |
Processor microcode firmware for AMD CPUs
|
Latest version: |
3.20191218.1ubuntu1.3 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Links
Download "amd64-microcode"
Other versions of "amd64-microcode" in Focal
Changelog
amd64-microcode (3.20191218.1ubuntu1.3) focal-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via improper MSR access
- amd-ucode/microcode_amd_fam{17,19}h.bin{,.asc}: add updated AMD
fam17h and fam19h CPU microcodes
- Updated microcodes:
Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126f Length=3200 bytes
Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107c Length=3200 bytes
Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 Length=5568 bytes
Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 Length=5568 bytes
Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 Length=5568 bytes
Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 Length=5568 bytes
- CVE-2023-31315
-- Alex Murray <email address hidden> Wed, 16 Oct 2024 15:53:30 +1030
|
Source diff to previous version |
CVE-2023-31315 |
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock i |
|
amd64-microcode (3.20191218.1ubuntu1.2) focal-security; urgency=medium
* SECURITY UPDATE: INCEPTION - information leak via speculative execution
- amd-ucode/microcode_amd_fam19h.bin{.asc}: add AMD fam19h cpu
microcode and signature for Inception vulnerability
- New microcodes:
Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079 Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d1 Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001234 Length=5568 bytes
Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a10113e Length=5568 bytes
Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e Length=5568 bytes
Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116 Length=5568 bytes
Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212 Length=5568 bytes
- CVE-2023-20569
-- Alex Murray <email address hidden> Mon, 21 Aug 2023 10:26:27 +0930
|
Source diff to previous version |
amd64-microcode (3.20191218.1ubuntu1.1) focal-security; urgency=medium
* SECURITY UPDATE: Zenbleed - information leak via speculative execution
- microcode_amd_fam17h.bin{.asc}: update AMD fam17h cpu microcode and
signature for Zenbleed vulnerability
- New microcodes:
+ Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a Length=3200 bytes
+ Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008 Length=3200 bytes
- Updated microcodes:
+ Family=0x17 Model=0x08 Stepping=0x02: Patch=0x0800820d Length=3200 bytes
+ Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126e Length=3200 bytes
- CVE-2023-20593
-- Alex Murray <email address hidden> Tue, 25 Jul 2023 13:47:45 +0930
|
CVE-2023-20593 |
An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural ... |
|
About
-
Send Feedback to @ubuntu_updates