UbuntuUpdates.org

Package "intel-microcode"

Name: intel-microcode

Description:

Processor microcode firmware for Intel CPUs

Latest version: 3.20231114.0ubuntu0.23.10.1
Release: mantic (23.10)
Level: updates
Repository: main
Homepage: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files

Links


Download "intel-microcode"


Other versions of "intel-microcode" in Mantic

Repository Area Version
base main 3.20230808.1
security main 3.20231114.0ubuntu0.23.10.1

Changelog

Version: 3.20231114.0ubuntu0.23.10.1 2023-11-16 09:10:35 UTC

  intel-microcode (3.20231114.0ubuntu0.23.10.1) mantic-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20231114
    - Updated microcodes:
      sig 0x000606a6, pf_mask 0x87, 2023-09-01, rev 0xd0003b9, size 299008
      sig 0x000606c1, pf_mask 0x10, 2023-09-08, rev 0x1000268, size 290816
      sig 0x000706e5, pf_mask 0x80, 2023-09-03, rev 0x00c2, size 113664
      sig 0x000806c1, pf_mask 0x80, 2023-09-07, rev 0x00b4, size 111616
      sig 0x000806c2, pf_mask 0xc2, 2023-09-07, rev 0x0034, size 98304
      sig 0x000806d1, pf_mask 0xc2, 2023-09-07, rev 0x004e, size 104448
      sig 0x000806f4, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f4, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f5, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f5, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f6, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f6, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f7, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x000806f8, pf_mask 0x10, 2023-06-26, rev 0x2c000290, size 605184
      sig 0x000806f8, pf_mask 0x87, 2023-06-16, rev 0x2b0004d0, size 572416
      sig 0x00090672, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
      sig 0x00090675, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
      sig 0x000906a3, pf_mask 0x80, 2023-06-07, rev 0x0430, size 220160
      sig 0x000906a4, pf_mask 0x40, 2023-05-05, rev 0x0005, size 117760
      sig 0x000906a4, pf_mask 0x80, 2023-06-07, rev 0x0430, size 220160
      sig 0x000a0671, pf_mask 0x02, 2023-09-03, rev 0x005d, size 104448
      sig 0x000b0671, pf_mask 0x32, 2023-08-29, rev 0x011d, size 210944
      sig 0x000b06a2, pf_mask 0xe0, 2023-08-30, rev 0x411c, size 216064
      sig 0x000b06a3, pf_mask 0xe0, 2023-08-30, rev 0x411c, size 216064
      sig 0x000b06e0, pf_mask 0x11, 2023-06-26, rev 0x0012, size 136192
      sig 0x000b06f2, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
      sig 0x000b06f5, pf_mask 0x07, 2023-06-07, rev 0x0032, size 222208
    - CVE-2023-23583, INTEL-SA-00950
  * source: update symlinks to reflect id of the latest release, 20231114

 -- Alex Murray <email address hidden> Wed, 15 Nov 2023 11:29:22 +1030

CVE-2023-23583 Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable es



About   -   Send Feedback to @ubuntu_updates