diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-09-30 17:15:53 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-09-30 17:15:53 +0000 |
commit | 272536df491b015cf7bf02e18eff68d3ecfdb314 (patch) | |
tree | 92a0f913edbe90e1abfbde3942fa5777cbf3d00e | |
parent | Releasing progress-linux version 3.20240531.1+nmu1-0.0~progress7.99u1. (diff) | |
download | intel-microcode-272536df491b015cf7bf02e18eff68d3ecfdb314.tar.xz intel-microcode-272536df491b015cf7bf02e18eff68d3ecfdb314.zip |
Merging upstream version 3.20240910.1.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r-- | changelog | 102 | ||||
-rw-r--r-- | intel-ucode/06-55-07 | bin | 37888 -> 39936 bytes | |||
-rw-r--r-- | intel-ucode/06-55-0b | bin | 30720 -> 30720 bytes | |||
-rw-r--r-- | intel-ucode/06-6a-06 | bin | 307200 -> 308224 bytes | |||
-rw-r--r-- | intel-ucode/06-6c-01 | bin | 299008 -> 300032 bytes | |||
-rw-r--r-- | intel-ucode/06-7e-05 | bin | 114688 -> 114688 bytes | |||
-rw-r--r-- | intel-ucode/06-8c-01 | bin | 111616 -> 112640 bytes | |||
-rw-r--r-- | intel-ucode/06-8c-02 | bin | 98304 -> 99328 bytes | |||
-rw-r--r-- | intel-ucode/06-8d-01 | bin | 104448 -> 104448 bytes | |||
-rw-r--r-- | intel-ucode/06-8e-09 | bin | 211968 -> 212992 bytes | |||
-rw-r--r-- | intel-ucode/06-8e-0a | bin | 105472 -> 105472 bytes | |||
-rw-r--r-- | intel-ucode/06-8e-0b | bin | 106496 -> 106496 bytes | |||
-rw-r--r-- | intel-ucode/06-8e-0c | bin | 106496 -> 106496 bytes | |||
-rw-r--r-- | intel-ucode/06-96-01 | bin | 20480 -> 20480 bytes | |||
-rw-r--r-- | intel-ucode/06-97-02 | bin | 224256 -> 224256 bytes | |||
-rw-r--r-- | intel-ucode/06-97-05 | bin | 224256 -> 224256 bytes | |||
-rw-r--r-- | intel-ucode/06-9a-03 | bin | 222208 -> 222208 bytes | |||
-rw-r--r-- | intel-ucode/06-9a-04 | bin | 342016 -> 342016 bytes | |||
-rw-r--r-- | intel-ucode/06-9e-0a | bin | 105472 -> 105472 bytes | |||
-rw-r--r-- | intel-ucode/06-9e-0b | bin | 106496 -> 106496 bytes | |||
-rw-r--r-- | intel-ucode/06-9e-0c | bin | 106496 -> 106496 bytes | |||
-rw-r--r-- | intel-ucode/06-9e-0d | bin | 106496 -> 106496 bytes | |||
-rw-r--r-- | intel-ucode/06-a5-02 | bin | 97280 -> 97280 bytes | |||
-rw-r--r-- | intel-ucode/06-a5-03 | bin | 97280 -> 98304 bytes | |||
-rw-r--r-- | intel-ucode/06-a5-05 | bin | 97280 -> 97280 bytes | |||
-rw-r--r-- | intel-ucode/06-a6-00 | bin | 97280 -> 97280 bytes | |||
-rw-r--r-- | intel-ucode/06-a6-01 | bin | 96256 -> 97280 bytes | |||
-rw-r--r-- | intel-ucode/06-a7-01 | bin | 108544 -> 108544 bytes | |||
-rw-r--r-- | intel-ucode/06-aa-04 | bin | 136192 -> 137216 bytes | |||
-rw-r--r-- | intel-ucode/06-b7-01 | bin | 215040 -> 215040 bytes | |||
-rw-r--r-- | intel-ucode/06-ba-02 | bin | 220160 -> 220160 bytes | |||
-rw-r--r-- | intel-ucode/06-ba-03 | bin | 220160 -> 220160 bytes | |||
-rw-r--r-- | intel-ucode/06-ba-08 | bin | 220160 -> 220160 bytes | |||
-rw-r--r-- | intel-ucode/06-be-00 | bin | 138240 -> 138240 bytes | |||
-rw-r--r-- | intel-ucode/06-bf-02 | bin | 224256 -> 224256 bytes | |||
-rw-r--r-- | intel-ucode/06-bf-05 | bin | 224256 -> 224256 bytes | |||
l--------- | microcode-20240910.d (renamed from microcode-20240531.d) | 0 | ||||
-rw-r--r-- | releasenote.md | 110 | ||||
l--------- | supplementary-ucode-20240910_BDX-ML.bin (renamed from supplementary-ucode-20240531_BDX-ML.bin) | 0 |
39 files changed, 210 insertions, 2 deletions
@@ -1,7 +1,92 @@ +2024-09-10: + * New upstream microcode datafile 20240910 + - Mitigations for INTEL-SA-01103 (CVE-2024-23984) + A potential security vulnerability in the Running Average Power Limit + (RAPL) interface for some Intel Processors may allow information + disclosure. + - Mitigations for INTEL-SA-01097 (CVE-2024-24968) + A potential security vulnerability in some Intel Processors may allow + denial of service. + - Fixes for unspecified functional issues on several processor models + - The processor voltage limit issue on Core 13rd/14th gen REQUIRES A + FIRMWARE UPDATE. It is present in this release for sig 0xb0671, but + THE VOLTAGE ISSUE FIX ONLY WORKS WHEN THE MICROCODE UPDATE IS LOADED + THROUGH THE FIT TABLE IN FIRMWARE. Contact your system vendor for a + firmware update that includes the appropriate microcode update for + your processor. + * Updated Microcodes: + sig 0x00090672, pf_mask 0x07, 2024-02-22, rev 0x0036, size 224256 + sig 0x00090675, pf_mask 0x07, 2024-02-22, rev 0x0036 + sig 0x000b06f2, pf_mask 0x07, 2024-02-22, rev 0x0036 + sig 0x000b06f5, pf_mask 0x07, 2024-02-22, rev 0x0036 + sig 0x000906a3, pf_mask 0x80, 2024-02-22, rev 0x0434, size 222208 + sig 0x000906a4, pf_mask 0x80, 2024-02-22, rev 0x0434 + sig 0x000a06a4, pf_mask 0xe6, 2024-06-17, rev 0x001f, size 137216 + sig 0x000b0671, pf_mask 0x32, 2024-07-18, rev 0x0129, size 215040 + sig 0x000b06a2, pf_mask 0xe0, 2024-02-22, rev 0x4122, size 220160 + sig 0x000b06a3, pf_mask 0xe0, 2024-02-22, rev 0x4122 + sig 0x000b06a8, pf_mask 0xe0, 2024-02-22, rev 0x4122 + sig 0x000b06e0, pf_mask 0x19, 2024-03-25, rev 0x001a, size 138240 + +2024-08-13: + * New upstream microcode datafile 20240813 (second release) + - Mitigations for INTEL-SA-01083 (CVE-2024-24853) + Incorrect behavior order in transition between executive monitor and SMI + transfer monitor (STM) in some Intel Processors may allow a privileged + user to potentially enable escalation of privilege via local access. + - Mitigations for INTEL-SA-01118 (CVE-2024-25939) + Mirrored regions with different values in 3rd Generation Intel Xeon + Scalable Processors may allow a privileged user to potentially enable + denial of service via local access. + - Mitigations for INTEL-SA-01100 (CVE-2024-24980) + Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel + Xeon Processors may allow a privileged user to potentially enable + escalation of privilege via local access. + - Mitigations for INTEL-SA-01038 (CVE-2023-42667) + Improper isolation in the Intel Core Ultra Processor stream cache + mechanism may allow an authenticated user to potentially enable + escalation of privilege via local access. Intel disclosed that some + processor models were already fixed by the previous microcode update. + - Mitigations for INTEL-SA-01046 (CVE-2023-49141) + Improper isolation in some Intel® Processors stream cache mechanism may + allow an authenticated user to potentially enable escalation of + privilege via local access. Intel disclosed that some processor models + were already fixed by the previous microcode update. + - Fix for unspecified functional issues on several processor models + - Fix for errata TGL068/ADL075/ICL088/... "Processor may hang during a + microcode update". It is not clear which processors were fixed by this + release, or by one of the microcode updates from 2024-05. + * Updated microcodes: + sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936 + sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720 + sig 0x000606a6, pf_mask 0x87, 2024-04-01, rev 0xd0003e7, size 308224 + sig 0x000606c1, pf_mask 0x10, 2024-04-03, rev 0x10002b0, size 300032 + sig 0x000706e5, pf_mask 0x80, 2024-02-15, rev 0x00c6, size 114688 + sig 0x000806c1, pf_mask 0x80, 2024-02-15, rev 0x00b8, size 112640 + sig 0x000806c2, pf_mask 0xc2, 2024-02-15, rev 0x0038, size 99328 + sig 0x000806d1, pf_mask 0xc2, 2024-02-15, rev 0x0052, size 104448 + sig 0x000806e9, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806e9, pf_mask 0x10, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806ea, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 105472 + sig 0x000806eb, pf_mask 0xd0, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000806ec, pf_mask 0x94, 2024-02-05, rev 0x00fc, size 106496 + sig 0x00090661, pf_mask 0x01, 2024-04-05, rev 0x001a, size 20480 + sig 0x000906ea, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 105472 + sig 0x000906eb, pf_mask 0x02, 2024-02-01, rev 0x00f6, size 106496 + sig 0x000906ec, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 106496 + sig 0x000906ed, pf_mask 0x22, 2024-02-05, rev 0x0100, size 106496 + sig 0x000a0652, pf_mask 0x20, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304 + sig 0x000a0655, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0660, pf_mask 0x80, 2024-02-01, rev 0x00fe, size 97280 + sig 0x000a0661, pf_mask 0x80, 2024-02-01, rev 0x00fc, size 97280 + sig 0x000a0671, pf_mask 0x02, 2024-03-07, rev 0x0062, size 108544 + sig 0x000a06a4, pf_mask 0xe6, 2024-04-15, rev 0x001e, size 137216 + 2024-05-31: * New upstream microcode datafile 20240531 - * Fix unspecified functional issues on Pentium Silver N/J5xxx, - Celeron N/J4xxx + - Fix unspecified functional issues on Pentium Silver N/J5xxx, + Celeron N/J4xxx * Updated Microcodes: sig 0x000706a1, pf_mask 0x01, 2024-04-19, rev 0x0042, size 76800 @@ -19,6 +104,19 @@ Improper input validation in some Intel TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access. + - Mitigations for INTEL-SA-01046 (CVE-2023-49141) + Improper isolation in some Intel Processors stream cache mechanism may + allow an authenticated user to potentially enable escalation of + privilege via local access (time-travel entry, added after Intel + released this information during the full disclosure for the 20240813 + update). Processor signatures 0x806f4-0x806f8, 0xb0671, 0x90672, and + 0x90675 + - Mitigations for INTEL-SA-01100 (CVE-2024-24980) for the Intel + Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel + Xeon Processors may allow a privileged user to potentially enable + escalation of privilege via local access (time-travel entry, added after + Intel released this information during the full disclosure for the + 20240813 update). Processor signatures 0xc06f1 and 0xc06f2. - Fix for unspecified functional issues on 4th gen and 5th gen Xeon Scalable, 12th, 13th and 14th gen Intel Core processors, as well as for Core i3 N-series processors. diff --git a/intel-ucode/06-55-07 b/intel-ucode/06-55-07 Binary files differindex ed8e1bb..eb51392 100644 --- a/intel-ucode/06-55-07 +++ b/intel-ucode/06-55-07 diff --git a/intel-ucode/06-55-0b b/intel-ucode/06-55-0b Binary files differindex 3765a13..b59300e 100644 --- a/intel-ucode/06-55-0b +++ b/intel-ucode/06-55-0b diff --git a/intel-ucode/06-6a-06 b/intel-ucode/06-6a-06 Binary files differindex 9252ca3..7a2cb68 100644 --- a/intel-ucode/06-6a-06 +++ b/intel-ucode/06-6a-06 diff --git a/intel-ucode/06-6c-01 b/intel-ucode/06-6c-01 Binary files differindex 04ab878..019a72a 100644 --- a/intel-ucode/06-6c-01 +++ b/intel-ucode/06-6c-01 diff --git a/intel-ucode/06-7e-05 b/intel-ucode/06-7e-05 Binary files differindex 70379a1..419b489 100644 --- a/intel-ucode/06-7e-05 +++ b/intel-ucode/06-7e-05 diff --git a/intel-ucode/06-8c-01 b/intel-ucode/06-8c-01 Binary files differindex b497e4f..8fc08a2 100644 --- a/intel-ucode/06-8c-01 +++ b/intel-ucode/06-8c-01 diff --git a/intel-ucode/06-8c-02 b/intel-ucode/06-8c-02 Binary files differindex 4707b7a..b371e6a 100644 --- a/intel-ucode/06-8c-02 +++ b/intel-ucode/06-8c-02 diff --git a/intel-ucode/06-8d-01 b/intel-ucode/06-8d-01 Binary files differindex 2a5ad8b..4b4bf88 100644 --- a/intel-ucode/06-8d-01 +++ b/intel-ucode/06-8d-01 diff --git a/intel-ucode/06-8e-09 b/intel-ucode/06-8e-09 Binary files differindex 0d11ae1..af8f21a 100644 --- a/intel-ucode/06-8e-09 +++ b/intel-ucode/06-8e-09 diff --git a/intel-ucode/06-8e-0a b/intel-ucode/06-8e-0a Binary files differindex 7fdf3fd..5170e0f 100644 --- a/intel-ucode/06-8e-0a +++ b/intel-ucode/06-8e-0a diff --git a/intel-ucode/06-8e-0b b/intel-ucode/06-8e-0b Binary files differindex b2e6a52..afd84dc 100644 --- a/intel-ucode/06-8e-0b +++ b/intel-ucode/06-8e-0b diff --git a/intel-ucode/06-8e-0c b/intel-ucode/06-8e-0c Binary files differindex 79b231e..6cf5f12 100644 --- a/intel-ucode/06-8e-0c +++ b/intel-ucode/06-8e-0c diff --git a/intel-ucode/06-96-01 b/intel-ucode/06-96-01 Binary files differindex 8f27f73..a218207 100644 --- a/intel-ucode/06-96-01 +++ b/intel-ucode/06-96-01 diff --git a/intel-ucode/06-97-02 b/intel-ucode/06-97-02 Binary files differindex 05450f8..efd034d 100644 --- a/intel-ucode/06-97-02 +++ b/intel-ucode/06-97-02 diff --git a/intel-ucode/06-97-05 b/intel-ucode/06-97-05 Binary files differindex 05450f8..efd034d 100644 --- a/intel-ucode/06-97-05 +++ b/intel-ucode/06-97-05 diff --git a/intel-ucode/06-9a-03 b/intel-ucode/06-9a-03 Binary files differindex b4f9b45..ac46000 100644 --- a/intel-ucode/06-9a-03 +++ b/intel-ucode/06-9a-03 diff --git a/intel-ucode/06-9a-04 b/intel-ucode/06-9a-04 Binary files differindex 27bfc92..5630a87 100644 --- a/intel-ucode/06-9a-04 +++ b/intel-ucode/06-9a-04 diff --git a/intel-ucode/06-9e-0a b/intel-ucode/06-9e-0a Binary files differindex 20ae2f3..ccbd25f 100644 --- a/intel-ucode/06-9e-0a +++ b/intel-ucode/06-9e-0a diff --git a/intel-ucode/06-9e-0b b/intel-ucode/06-9e-0b Binary files differindex 4605e57..04a5997 100644 --- a/intel-ucode/06-9e-0b +++ b/intel-ucode/06-9e-0b diff --git a/intel-ucode/06-9e-0c b/intel-ucode/06-9e-0c Binary files differindex d5f3aa0..ba36a02 100644 --- a/intel-ucode/06-9e-0c +++ b/intel-ucode/06-9e-0c diff --git a/intel-ucode/06-9e-0d b/intel-ucode/06-9e-0d Binary files differindex d3b689a..b4916c0 100644 --- a/intel-ucode/06-9e-0d +++ b/intel-ucode/06-9e-0d diff --git a/intel-ucode/06-a5-02 b/intel-ucode/06-a5-02 Binary files differindex 31a1a4d..a6fdab7 100644 --- a/intel-ucode/06-a5-02 +++ b/intel-ucode/06-a5-02 diff --git a/intel-ucode/06-a5-03 b/intel-ucode/06-a5-03 Binary files differindex 581d5cb..aadd8c9 100644 --- a/intel-ucode/06-a5-03 +++ b/intel-ucode/06-a5-03 diff --git a/intel-ucode/06-a5-05 b/intel-ucode/06-a5-05 Binary files differindex dffdcd5..1ac94fb 100644 --- a/intel-ucode/06-a5-05 +++ b/intel-ucode/06-a5-05 diff --git a/intel-ucode/06-a6-00 b/intel-ucode/06-a6-00 Binary files differindex 0c3b14a..82b2316 100644 --- a/intel-ucode/06-a6-00 +++ b/intel-ucode/06-a6-00 diff --git a/intel-ucode/06-a6-01 b/intel-ucode/06-a6-01 Binary files differindex e174946..fbd5a15 100644 --- a/intel-ucode/06-a6-01 +++ b/intel-ucode/06-a6-01 diff --git a/intel-ucode/06-a7-01 b/intel-ucode/06-a7-01 Binary files differindex 1610dee..cdd4d65 100644 --- a/intel-ucode/06-a7-01 +++ b/intel-ucode/06-a7-01 diff --git a/intel-ucode/06-aa-04 b/intel-ucode/06-aa-04 Binary files differindex cc1f4ab..f7ce6aa 100644 --- a/intel-ucode/06-aa-04 +++ b/intel-ucode/06-aa-04 diff --git a/intel-ucode/06-b7-01 b/intel-ucode/06-b7-01 Binary files differindex fc76856..ed73396 100644 --- a/intel-ucode/06-b7-01 +++ b/intel-ucode/06-b7-01 diff --git a/intel-ucode/06-ba-02 b/intel-ucode/06-ba-02 Binary files differindex c2b3de7..76a1275 100644 --- a/intel-ucode/06-ba-02 +++ b/intel-ucode/06-ba-02 diff --git a/intel-ucode/06-ba-03 b/intel-ucode/06-ba-03 Binary files differindex c2b3de7..76a1275 100644 --- a/intel-ucode/06-ba-03 +++ b/intel-ucode/06-ba-03 diff --git a/intel-ucode/06-ba-08 b/intel-ucode/06-ba-08 Binary files differindex c2b3de7..76a1275 100644 --- a/intel-ucode/06-ba-08 +++ b/intel-ucode/06-ba-08 diff --git a/intel-ucode/06-be-00 b/intel-ucode/06-be-00 Binary files differindex 7be2d62..5316c7e 100644 --- a/intel-ucode/06-be-00 +++ b/intel-ucode/06-be-00 diff --git a/intel-ucode/06-bf-02 b/intel-ucode/06-bf-02 Binary files differindex 05450f8..efd034d 100644 --- a/intel-ucode/06-bf-02 +++ b/intel-ucode/06-bf-02 diff --git a/intel-ucode/06-bf-05 b/intel-ucode/06-bf-05 Binary files differindex 05450f8..efd034d 100644 --- a/intel-ucode/06-bf-05 +++ b/intel-ucode/06-bf-05 diff --git a/microcode-20240531.d b/microcode-20240910.d index 8c34252..8c34252 120000 --- a/microcode-20240531.d +++ b/microcode-20240910.d diff --git a/releasenote.md b/releasenote.md index 33229f5..f00475e 100644 --- a/releasenote.md +++ b/releasenote.md @@ -1,4 +1,114 @@ # Release Notes
+## [microcode-20240910](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)
+
+### Purpose
+
+- Security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html)
+- Security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html)
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
+
+### New Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| TWL | N0 | 06-be-00/19 | | 0000001a | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+
+### Updated Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| ADL | C0 | 06-97-02/07 | 00000035 | 00000036 | Core Gen12
+| ADL | H0 | 06-97-05/07 | 00000035 | 00000036 | Core Gen12
+| ADL | L0 | 06-9a-03/80 | 00000433 | 00000434 | Core Gen12
+| ADL | R0 | 06-9a-04/80 | 00000433 | 00000434 | Core Gen12
+| ADL-N | N0 | 06-be-00/11 | 00000017 | 0000001a | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
+| MTL | C0 | 06-aa-04/e6 | 0000001e | 0000001f | Core™ Ultra Processor
+| RPL-E/HX/S | B0 | 06-b7-01/32 | 00000123 | 00000129 | Core Gen13/Gen14
+| RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004121 | 00004122 | Core Gen13
+| RPL-HX/S | C0 | 06-bf-02/07 | 00000035 | 00000036 | Core Gen13/Gen14
+| RPL-S | H0 | 06-bf-05/07 | 00000035 | 00000036 | Core Gen13/Gen14
+| RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004121 | 00004122 | Core Gen13
+
+
+# Release Notes
+## [microcode-20240813](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813)
+
+## Update: Corrected the MCU file for 06-a5-03
+
+### Purpose
+
+- Security updates for [INTEL-SA-01083](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html)
+- Security updates for [INTEL-SA-01118](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html)
+- Security updates for [INTEL-SA-01100](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html)
+- Security updates for [INTEL-SA-01038](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html)
+- Security updates for [INTEL-SA-01046](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html)
+
+
+- Update for functional issues. Refer to [Intel® Core™ Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
+- Update for functional issues. Refer to [3rd Generation Intel® Xeon® Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
+- Update for functional issues. Refer to [2nd Generation Intel® Xeon® Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details
+- Update for functional issues. Refer to [Intel® Xeon® D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
+- Update for functional issues. Refer to [Intel® Xeon® E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
+- Update for functional issues. Refer to [13th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
+- Update for functional issues. Refer to [12th Generation Intel® Core™ Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
+- Update for functional issues. Refer to [11th Gen Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
+- Update for functional issues. Refer to [10th Gen Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
+- Update for functional issues. Refer to [10th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213) for details.
+- Update for functional issues. Refer to [8th and 9th Generation Intel® Core™ Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
+- Update for functional issues. Refer to [8th Generation Intel® Core™ Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
+- Update for functional issues. Refer to [7th and 8th Generation Intel® Core™ Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
+- Update for functional issues. Refer to [Intel® Processors and Intel® Core™ i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
+- Update for functional issues. Refer to [Intel® Atom® x6000E Series, and Intel® Pentium® and Celeron® N and J Series Processors for Internet of Things (IoT) Applications](https://cdrdv2.intel.com/v1/dl/getContent/636674) for details.
+
+
+### New Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+
+
+### Updated Platforms
+
+| Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products
+|:---------------|:---------|:------------|:---------|:---------|:---------
+| AML-Y22 | H0 | 06-8e-09/10 | 000000f4 | 000000f6 | Core Gen8 Mobile
+| AML-Y42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
+| CFL-H | R0 | 06-9e-0d/22 | 000000fc | 00000100 | Core Gen9 Mobile
+| CFL-H/S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
+| CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000f6 | 000000f8 | Core Gen8 Desktop, Mobile, Xeon E
+| CFL-S | B0 | 06-9e-0b/02 | 000000f4 | 000000f6 | Core Gen8
+| CFL-S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 Desktop
+| CFL-U43e | D0 | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile
+| CLX-SP | B1 | 06-55-07/bf | 05003605 | 05003707 | Xeon Scalable Gen2
+| CML-H | R1 | 06-a5-02/20 | 000000fa | 000000fc | Core Gen10 Mobile
+| CML-S102 | Q0 | 06-a5-05/22 | 000000fa | 000000fc | Core Gen10
+| CML-S62 | G1 | 06-a5-03/22 | 000000fa | 000000fc | Core Gen10
+| CML-U42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
+| CML-U62 V1 | A0 | 06-a6-00/80 | 000000fa | 000000fe | Core Gen10 Mobile
+| CML-U62 V2 | K1 | 06-a6-01/80 | 000000fa | 000000fc | Core Gen10 Mobile
+| CML-Y42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
+| CPX-SP | A1 | 06-55-0b/bf | 07002802 | 07002904 | Xeon Scalable Gen3
+| EHL | B1 | 06-96-01/01 | 00000019 | 0000001a | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
+| ICL-D | B0 | 06-6c-01/10 | 01000290 | 010002b0 | Xeon D-17xx, D-27xx
+| ICL-U/Y | D1 | 06-7e-05/80 | 000000c4 | 000000c6 | Core Gen10 Mobile
+| ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003d1 | 0d0003e7 | Xeon Scalable Gen3
+| KBL-R U | Y0 | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile
+| KBL-U23e | J1 | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile
+| KBL-U/Y | H0 | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile
+| MTL | C-0 | 06-aa-04/e6 | 0000001c | 0000001e | Core™ Ultra Processor
+| RKL-S | B0 | 06-a7-01/02 | 0000005e | 00000062 | Core Gen11
+| TGL | B0/B1 | 06-8c-01/80 | 000000b6 | 000000b8 | Core Gen11 Mobile
+| TGL-H | R0 | 06-8d-01/c2 | 00000050 | 00000052 | Core Gen11 Mobile
+| TGL-R | C0 | 06-8c-02/c2 | 00000036 | 00000038 | Core Gen11 Mobile
+| WHL-U | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen8 Mobile
+| WHL-U | W0 | 06-8e-0b/d0 | 000000f4 | 000000f6 | Core Gen8 Mobile
+
+
+# Release Notes
## [microcode-20240531](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240531)
### Purpose
diff --git a/supplementary-ucode-20240531_BDX-ML.bin b/supplementary-ucode-20240910_BDX-ML.bin index 213bbce..213bbce 120000 --- a/supplementary-ucode-20240531_BDX-ML.bin +++ b/supplementary-ucode-20240910_BDX-ML.bin |