UbuntuUpdates.org

Package "intel-microcode"

Name: intel-microcode

Description:

Processor microcode firmware for Intel CPUs

Latest version: 3.20241112.0ubuntu0.24.04.1
Release: noble (24.04)
Level: security
Repository: main
Homepage: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files

Links


Download "intel-microcode"


Other versions of "intel-microcode" in Noble

Repository Area Version
base main 3.20240312.1build1
updates main 3.20241112.0ubuntu0.24.04.1

Changelog

Version: 3.20241112.0ubuntu0.24.04.1 2024-12-11 03:07:00 UTC

  intel-microcode (3.20241112.0ubuntu0.24.04.1) noble-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20241112
    - Updated microcodes:
      sig 0x000806f4, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f5, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f6, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f7, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x000806f8, pf_mask 0x87, 2024-06-20, rev 0x2b000603, size 588800
      sig 0x00090672, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x00090675, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x000906a3, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
      sig 0x000906a4, pf_mask 0x80, 2024-06-03, rev 0x0435, size 223232
      sig 0x000a06a4, pf_mask 0xe6, 2024-08-02, rev 0x0020, size 138240
      sig 0x000b0671, pf_mask 0x32, 2024-08-29, rev 0x012b, size 211968
      sig 0x000b06a2, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
      sig 0x000b06a8, pf_mask 0xe0, 2024-05-29, rev 0x4123, size 220160
      sig 0x000b06f2, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2024-05-29, rev 0x0037, size 224256
      sig 0x000c06f1, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
      sig 0x000c06f2, pf_mask 0x87, 2024-06-20, rev 0x21000283, size 560128
    - CVE-2024-21853 (INTEL-SA-01101)
    - CVE-2024-23918 (INTEL-SA-01079)
    - CVE-2024-21820 (INTEL-SA-01079)
    - CVE-2024-24968 (INTEL-SA-01097)
    - CVE-2024-23984 (INTEL-SA-01103)
  * source: update symlinks to reflect id of the latest release, 20241112

 -- Alex Murray <email address hidden> Mon, 09 Dec 2024 14:22:28 +1030

Source diff to previous version
CVE-2024-21853 Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user t
CVE-2024-23918 Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to
CVE-2024-21820 Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user
CVE-2024-24968 Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of se
CVE-2024-23984 Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via lo

Version: 3.20240910.0ubuntu0.24.04.1 2024-09-25 03:06:49 UTC

  intel-microcode (3.20240910.0ubuntu0.24.04.1) noble-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20240910
    - Updated microcodes:
      sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
      sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208
      sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216
      sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040
      sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160
      sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256
    - CVE-2024-23984 (INTEL-SA-01103)
    - CVE-2024-24968 (INTEL-SA-01097)
  * source: update symlinks to reflect id of the latest release, 20240910

 -- Alex Murray <email address hidden> Thu, 12 Sep 2024 10:17:57 +0930

Source diff to previous version
CVE-2024-23984 Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via lo
CVE-2024-24968 Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of se

Version: 3.20240813.0ubuntu0.24.04.2 2024-08-19 17:07:12 UTC

  intel-microcode (3.20240813.0ubuntu0.24.04.2) noble-security; urgency=medium

  * SECURITY UPDATE: Respin based on newly retagged upstream microcode
    datafile 20240813
    - Updated microcodes:
      sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304
    - CVE-2024-24853 (INTEL-SA-01083)
    - CVE-2024-25939 (INTEL-SA-01118)
    - CVE-2024-24980 (INTEL-SA-01100)
    - CVE-2023-42667 (INTEL-SA-01038)
    - CVE-2023-49141 (INTEL-SA-01046)
  * ucode-blacklist: revert previous change to blacklist models 0x8e and
    0x9e from late-loading as late-loading is not supported in Ubuntu
    anymore either

Source diff to previous version
CVE-2024-24853 Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged use
CVE-2024-25939 Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denia
CVE-2024-24980 Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escal
CVE-2023-42667 Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation o
CVE-2023-49141 Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege v

Version: 3.20240514.0ubuntu0.24.04.1 2024-05-29 09:07:05 UTC

  intel-microcode (3.20240514.0ubuntu0.24.04.1) noble-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20240514
    - Updated microcodes:
      sig 0x000806f4, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f4, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f5, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f5, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f6, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f6, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f7, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f8, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f8, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x00090672, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x00090675, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000906a3, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208
      sig 0x000906a4, pf_mask 0x40, 2023-12-07, rev 0x0007, size 119808
      sig 0x000906a4, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208
      sig 0x000b0671, pf_mask 0x32, 2024-01-25, rev 0x0123, size 215040
      sig 0x000b06e0, pf_mask 0x11, 2023-12-07, rev 0x0017, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000c06f1, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960
      sig 0x000c06f2, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960
    - CVE-2023-45733 (INTEL-SA-01051)
    - CVE-2023-46103 (INTEL-SA-01052)
    - CVE-2023-45745 (INTEL-SA-01036)
    - CVE-2023-47855 (INTEL-SA-01036)
  * source: update symlinks to reflect id of the latest release, 20240514

 -- Alex Murray <email address hidden> Wed, 15 May 2024 13:27:08 +0930

CVE-2023-45733 Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclos
CVE-2023-46103 Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially
CVE-2023-45745 Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalat
CVE-2023-47855 Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalat



About   -   Send Feedback to @ubuntu_updates