UbuntuUpdates.org

Package "intel-microcode"

Name: intel-microcode

Description:

Processor microcode firmware for Intel CPUs

Latest version: 3.20240910.0ubuntu0.22.04.1
Release: jammy (22.04)
Level: updates
Repository: main
Homepage: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files

Links


Download "intel-microcode"


Other versions of "intel-microcode" in Jammy

Repository Area Version
base main 3.20210608.2ubuntu1
security main 3.20240910.0ubuntu0.22.04.1

Changelog

Version: 3.20240910.0ubuntu0.22.04.1 2024-09-25 04:07:03 UTC

  intel-microcode (3.20240910.0ubuntu0.22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20240910
    - Updated microcodes:
      sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
      sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
      sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216
      sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040
      sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
    - CVE-2024-23984 (INTEL-SA-01103)
    - CVE-2024-24968 (INTEL-SA-01097)
  * source: update symlinks to reflect id of the latest release, 20240910

 -- Alex Murray <email address hidden> Thu, 12 Sep 2024 10:19:00 +0930

Source diff to previous version
CVE-2024-23984 Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via lo
CVE-2024-24968 Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of se

Version: 3.20240813.0ubuntu0.22.04.2 2024-08-19 10:07:14 UTC

  intel-microcode (3.20240813.0ubuntu0.22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Respin based on newly retagged upstream microcode
    datafile 20240813
    - Updated microcodes:
      sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304
    - CVE-2024-24853 (INTEL-SA-01083)
    - CVE-2024-25939 (INTEL-SA-01118)
    - CVE-2024-24980 (INTEL-SA-01100)
    - CVE-2023-42667 (INTEL-SA-01038)
    - CVE-2023-49141 (INTEL-SA-01046)
  * ucode-blacklist: revert previous change to blacklist models 0x8e and
    0x9e from late-loading as late-loading is not supported in Ubuntu
    anymore either

Source diff to previous version
CVE-2024-24853 Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged use
CVE-2024-25939 Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denia
CVE-2024-24980 Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escal
CVE-2023-42667 Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation o
CVE-2023-49141 Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege v

Version: 3.20240514.0ubuntu0.22.04.1 2024-05-29 10:07:10 UTC

  intel-microcode (3.20240514.0ubuntu0.22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20240514
    - New microcodes:
      sig 0x000a06a4, pf_mask 0xe6, 2024-01-03, rev 0x001c, size 136192
      sig 0x000b06a8, pf_mask 0xe0, 2023-12-07, rev 0x4121, size 220160
      sig 0x000c06f1, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960
      sig 0x000c06f2, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960
    - Updated microcodes:
      sig 0x00050653, pf_mask 0x97, 2023-07-28, rev 0x1000191, size 36864
      sig 0x00050656, pf_mask 0xbf, 2023-07-28, rev 0x4003605, size 38912
      sig 0x00050657, pf_mask 0xbf, 2023-07-28, rev 0x5003605, size 37888
      sig 0x0005065b, pf_mask 0xbf, 2023-08-03, rev 0x7002802, size 30720
      sig 0x00050665, pf_mask 0x10, 2023-08-03, rev 0xe000015, size 23552
      sig 0x000506f1, pf_mask 0x01, 2023-10-05, rev 0x003e, size 11264
      sig 0x000606a6, pf_mask 0x87, 2023-09-14, rev 0xd0003d1, size 307200
      sig 0x000606c1, pf_mask 0x10, 2023-12-05, rev 0x1000290, size 299008
      sig 0x000706a1, pf_mask 0x01, 2023-08-25, rev 0x0040, size 76800
      sig 0x000706a8, pf_mask 0x01, 2023-08-25, rev 0x0024, size 76800
      sig 0x000706e5, pf_mask 0x80, 2023-09-14, rev 0x00c4, size 114688
      sig 0x000806c1, pf_mask 0x80, 2023-09-13, rev 0x00b6, size 111616
      sig 0x000806c2, pf_mask 0xc2, 2023-09-13, rev 0x0036, size 98304
      sig 0x000806d1, pf_mask 0xc2, 2023-09-13, rev 0x0050, size 104448
      sig 0x000806ec, pf_mask 0x94, 2023-07-16, rev 0x00fa, size 106496
      sig 0x000806f4, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f4, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f5, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f5, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f6, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f6, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f7, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f8, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f8, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x00090661, pf_mask 0x01, 2023-09-26, rev 0x0019, size 20480
      sig 0x00090672, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x00090675, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000906a3, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208
      sig 0x000906a4, pf_mask 0x40, 2023-12-07, rev 0x0007, size 119808
      sig 0x000906a4, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208
      sig 0x000906c0, pf_mask 0x01, 2023-09-26, rev 0x24000026, size 20480
      sig 0x000906e9, pf_mask 0x2a, 2023-09-28, rev 0x00f8, size 108544
      sig 0x000906ea, pf_mask 0x22, 2023-07-26, rev 0x00f6, size 105472
      sig 0x000906ec, pf_mask 0x22, 2023-07-26, rev 0x00f6, size 106496
      sig 0x000906ed, pf_mask 0x22, 2023-07-27, rev 0x00fc, size 106496
      sig 0x000a0652, pf_mask 0x20, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0653, pf_mask 0x22, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0655, pf_mask 0x22, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0660, pf_mask 0x80, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0661, pf_mask 0x80, 2023-07-16, rev 0x00fa, size 96256
      sig 0x000a0671, pf_mask 0x02, 2023-09-14, rev 0x005e, size 108544
      sig 0x000b0671, pf_mask 0x32, 2024-01-25, rev 0x0123, size 215040
      sig 0x000b06a2, pf_mask 0xe0, 2023-12-07, rev 0x4121, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2023-12-07, rev 0x4121, size 220160
      sig 0x000b06e0, pf_mask 0x11, 2023-12-07, rev 0x0017, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
    - CVE-2023-45733 (INTEL-SA-01051)
    - CVE-2023-46103 (INTEL-SA-01052)
    - CVE-2023-45745 (INTEL-SA-01036)
    - CVE-2023-47855 (INTEL-SA-01036)
    - CVE-2023-39368 (INTEL-SA-00972)
    - CVE-2023-38575 (INTEL-SA-00982)
    - CVE-2023-28746 (INTEL-SA-00898)
    - CVE-2023-22655 (INTEL-SA-00960)
    - CVE-2023-43490 (INTEL-SA-01045)
  * source: update symlinks to reflect id of the latest release, 20240514

 -- Alex Murray <email address hidden> Wed, 15 May 2024 13:47:34 +0930

Source diff to previous version
CVE-2023-45733 Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclos
CVE-2023-46103 Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially
CVE-2023-45745 Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalat
CVE-2023-47855 Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalat
CVE-2023-39368 Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of ser
CVE-2023-38575 Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable i
CVE-2023-28746 Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may all
CVE-2023-22655 Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privilege
CVE-2023-43490 Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potential

Version: 3.20231114.0ubuntu0.22.04.1 2023-11-16 09:10:32 UTC

  intel-microcode (3.20231114.0ubuntu0.22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20231114
    - Updated microcodes:
      sig 0x000606a6, pf_mask 0x87, 2023-09-01, rev 0xd0003b9, size 299008
      sig 0x000606c1, pf_mask 0x10, 2023-09-08, rev 0x1000268, size 290816
      sig 0x000706e5, pf_mask 0x80, 2023-09-03, rev 0x00c2, size 113664
      sig 0x000806c1, pf_mask 0x80, 2023-09-07, rev 0x00b4, size 111616
      sig 0x000806c2, pf_mask 0xc2, 2023-09-07, rev 0x0034, size 98304
      sig 0x000806d1, pf_mask 0xc2, 2023-09-07, rev 0x004e, size 104448
      sig 0x000806f4, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f4, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f5, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f5, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f6, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f6, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f7, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f8, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f8, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x00090672, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
      sig 0x00090675, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
      sig 0x000906a3, pf_mask 0x80, 2023-06-07, rev 0x0430, size 220160
      sig 0x000906a4, pf_mask 0x40, 2023-05-05, rev 0x0005, size 117760
      sig 0x000906a4, pf_mask 0x80, 2023-06-07, rev 0x0430, size 220160
      sig 0x000a0671, pf_mask 0x02, 2023-09-03, rev 0x005d, size 104448
      sig 0x000b0671, pf_mask 0x32, 2023-08-29, rev 0x011d, size 210944
      sig 0x000b06a2, pf_mask 0xe0, 2023-08-30, rev 0x411c, size 216064
      sig 0x000b06a3, pf_mask 0xe0, 2023-08-30, rev 0x411c, size 216064
      sig 0x000b06e0, pf_mask 0x11, 2023-06-26, rev 0x0012, size 136192
      sig 0x000b06f2, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
      sig 0x000b06f5, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
    - CVE-2023-23583, INTEL-SA-00950
  * source: update symlinks to reflect id of the latest release, 20231114

 -- Alex Murray <email address hidden> Wed, 15 Nov 2023 11:33:06 +1030

Source diff to previous version
CVE-2023-23583 Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable es

Version: 3.20230808.0ubuntu0.22.04.1 2023-08-14 03:06:54 UTC

  intel-microcode (3.20230808.0ubuntu0.22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20230808
    - New microcodes:
      sig 0x000b06e0, pf_mask 0x11, 2023-04-12, rev 0x0011, size 136192
    - Updated microcodes:
      sig 0x00050653, pf_mask 0x97, 2023-03-23, rev 0x1000181, size 36864
      sig 0x00050654, pf_mask 0xb7, 2023-03-06, rev 0x2007006, size 44032
      sig 0x00050656, pf_mask 0xbf, 2023-03-17, rev 0x4003604, size 38912
      sig 0x00050657, pf_mask 0xbf, 2023-03-17, rev 0x5003604, size 38912
      sig 0x0005065b, pf_mask 0xbf, 2023-03-21, rev 0x7002703, size 30720
      sig 0x000606a6, pf_mask 0x87, 2023-03-30, rev 0xd0003a5, size 297984
      sig 0x000606c1, pf_mask 0x10, 2023-01-27, rev 0x1000230, size 289792
      sig 0x000706e5, pf_mask 0x80, 2023-02-26, rev 0x00bc, size 113664
      sig 0x000806a1, pf_mask 0x10, 2023-01-13, rev 0x0033, size 34816
      sig 0x000806c1, pf_mask 0x80, 2023-02-27, rev 0x00ac, size 111616
      sig 0x000806c2, pf_mask 0xc2, 2023-02-27, rev 0x002c, size 98304
      sig 0x000806d1, pf_mask 0xc2, 2023-02-27, rev 0x0046, size 103424
      sig 0x000806e9, pf_mask 0x10, 2023-02-23, rev 0x00f4, size 105472
      sig 0x000806e9, pf_mask 0xc0, 2023-02-22, rev 0x00f4, size 106496
      sig 0x000806ea, pf_mask 0xc0, 2023-02-23, rev 0x00f4, size 105472
      sig 0x000806eb, pf_mask 0xd0, 2023-02-23, rev 0x00f4, size 106496
      sig 0x000806ec, pf_mask 0x94, 2023-02-26, rev 0x00f8, size 106496
      sig 0x000806f4, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184
      sig 0x000806f4, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
      sig 0x000806f5, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184
      sig 0x000806f5, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
      sig 0x000806f6, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184
      sig 0x000806f6, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
      sig 0x000806f7, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
      sig 0x000806f8, pf_mask 0x10, 2023-05-15, rev 0x2c000271, size 605184
      sig 0x000806f8, pf_mask 0x87, 2023-05-09, rev 0x2b0004b1, size 572416
      sig 0x00090672, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160
      sig 0x00090675, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160
      sig 0x000906a3, pf_mask 0x80, 2023-04-18, rev 0x042c, size 219136
      sig 0x000906a4, pf_mask 0x40, 2022-10-12, rev 0x0004, size 115712
      sig 0x000906a4, pf_mask 0x80, 2023-04-18, rev 0x042c, size 219136
      sig 0x000906e9, pf_mask 0x2a, 2023-02-23, rev 0x00f4, size 108544
      sig 0x000906ea, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 104448
      sig 0x000906eb, pf_mask 0x02, 2023-02-23, rev 0x00f4, size 106496
      sig 0x000906ec, pf_mask 0x22, 2023-02-23, rev 0x00f4, size 105472
      sig 0x000906ed, pf_mask 0x22, 2023-02-27, rev 0x00fa, size 106496
      sig 0x000a0652, pf_mask 0x20, 2023-02-23, rev 0x00f8, size 97280
      sig 0x000a0653, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280
      sig 0x000a0655, pf_mask 0x22, 2023-02-23, rev 0x00f8, size 97280
      sig 0x000a0660, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 97280
      sig 0x000a0661, pf_mask 0x80, 2023-02-23, rev 0x00f8, size 96256
      sig 0x000a0671, pf_mask 0x02, 2023-02-26, rev 0x0059, size 104448
      sig 0x000b0671, pf_mask 0x32, 2023-06-06, rev 0x0119, size 210944
      sig 0x000b06a2, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064
      sig 0x000b06a3, pf_mask 0xe0, 2023-06-06, rev 0x4119, size 216064
      sig 0x000b06f2, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160
      sig 0x000b06f5, pf_mask 0x07, 2023-04-18, rev 0x002e, size 220160
    - CVE-2022-40982, INTEL-SA-00828
    - CVE-2022-41804, INTEL-SA-00837
    - CVE-2023-23908, INTEL-SA-00836
  * source: update symlinks to reflect id of the latest release, 20230808

 -- Camila Camargo de Matos <email address hidden> Thu, 10 Aug 2023 09:27:07 -0300

CVE-2022-40982 Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may al
CVE-2022-41804 Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable e
CVE-2023-23908 Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information dis



About   -   Send Feedback to @ubuntu_updates