From b76b34a997b86a868902fa67bf96ce51843470049d103950a82ecf642248f6ff Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adrian=20Schr=C3=B6ter?= Date: Fri, 15 Nov 2024 15:03:29 +0100 Subject: [PATCH] Sync from SUSE:SLFO:Main ucode-intel revision b049f659b6b24f3861bc99b89f1ce26b --- microcode-20240910.tar.gz | 3 -- microcode-20241112.tar.gz | 3 ++ ucode-intel.changes | 66 +++++++++++++++++++++++++++++++++++++++ ucode-intel.spec | 2 +- 4 files changed, 70 insertions(+), 4 deletions(-) delete mode 100644 microcode-20240910.tar.gz create mode 100644 microcode-20241112.tar.gz diff --git a/microcode-20240910.tar.gz b/microcode-20240910.tar.gz deleted file mode 100644 index 7c934c6..0000000 --- a/microcode-20240910.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:8b7582eac7e9a691356e18b3bdcbc7b2db09494e040ec980a4a5fb6d0da261bf -size 12879730 diff --git a/microcode-20241112.tar.gz b/microcode-20241112.tar.gz new file mode 100644 index 0000000..e1627bd --- /dev/null +++ b/microcode-20241112.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:37246208ef68039be752438c72400a688a2238df13a7f5282497c80be2d8366d +size 12923653 diff --git a/ucode-intel.changes b/ucode-intel.changes index ba52271..6f3d79b 100644 --- a/ucode-intel.changes +++ b/ucode-intel.changes @@ -1,3 +1,69 @@ +------------------------------------------------------------------- +Wed Nov 13 10:50:31 UTC 2024 - Marcus Meissner + + +- Intel CPU Microcode was updated to the 20241112 release (bsc#1233313) + + - CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel Xeon Processors may allow an authorized user to potentially enable denial of service via local access. Security updates for [INTEL-SA-01101](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html) + - CVE-2024-23918: Improper conditions check in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html) + - CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. Security updates for [INTEL-SA-01079](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html) + - CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access. Updated security updates for [INTEL-SA-01097](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html) + - CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access Updated security updates for [INTEL-SA-01103](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html) + - Update for functional issues. Refer to [Intel Core Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details. + - Update for functional issues. Refer to [14th/13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details. + - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details. + - Update for functional issues. Refer to [5th Gen Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/793902) for details. + - Update for functional issues. Refer to [4th Gen Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/772415) for details. + - Update for functional issues. Refer to [3rd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details. + - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details. + - Update for functional issues. Refer to [Intel Xeon D-1700 and D-1800 Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714069) for details + + New Platforms: + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + + + Updated Platforms: + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + | ADL | C0 | 06-97-02/07 | 00000036 | 00000037 | Core Gen12 + | ADL | H0 | 06-97-05/07 | 00000036 | 00000037 | Core Gen12 + | ADL | L0 | 06-9a-03/80 | 00000434 | 00000435 | Core Gen12 + | ADL | R0 | 06-9a-04/80 | 00000434 | 00000435 | Core Gen12 + | EMR-SP | A0 | 06-cf-01/87 | 21000230 | 21000283 | Xeon Scalable Gen5 + | EMR-SP | A1 | 06-cf-02/87 | 21000230 | 21000283 | Xeon Scalable Gen5 + | MTL | C0 | 06-aa-04/e6 | 0000001f | 00000020 | Coreā„¢ Ultra Processor + | RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004122 | 00004123 | Core Gen13 + | RPL-HX/S | C0 | 06-bf-02/07 | 00000036 | 00000037 | Core Gen13/Gen14 + | RPL-S | H0 | 06-bf-05/07 | 00000036 | 00000037 | Core Gen13/Gen14 + | RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004122 | 00004123 | Core Gen13 + | SPR-SP | E3 | 06-8f-06/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4 + | SPR-SP | E4/S2 | 06-8f-07/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4 + | SPR-SP | E5/S3 | 06-8f-08/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4 + + + New Disclosures Updated in Prior Releases: + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + | ICL-D | B0 | 06-6c-01/10 | 010002b0 | N/A | Xeon D-17xx/D-18xx, D-27xx/D-28xx + | ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003e7 | N/A | Xeon Scalable Gen3 + +------------------------------------------------------------------- +Thu Oct 31 13:27:15 UTC 2024 - Marcus Meissner + +- Intel CPU Microcode was updated to the 20241029 release + + Update for functional issues. Refer to [14th/13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details. + + Updated Platforms: + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + | RPL-E/HX/S | B0 | 06-b7-01/32 | 00000129 | 0000012b | Core Gen13/Gen14 + ------------------------------------------------------------------- Wed Sep 11 14:02:21 UTC 2024 - Marcus Meissner diff --git a/ucode-intel.spec b/ucode-intel.spec index 73d91be..1885812 100644 --- a/ucode-intel.spec +++ b/ucode-intel.spec @@ -20,7 +20,7 @@ %define _firmwaredir /lib/firmware %endif Name: ucode-intel -Version: 20240910 +Version: 20241112 Release: 0 Summary: Microcode Updates for Intel x86/x86-64 CPUs License: SUSE-Firmware