UbuntuUpdates.org

Package "amd64-microcode"

Name: amd64-microcode

Description:

Processor microcode firmware for AMD CPUs

Latest version: 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2
Release: xenial (16.04)
Level: security
Repository: main

Links


Download "amd64-microcode"


Other versions of "amd64-microcode" in Xenial

Repository Area Version
base multiverse 2.20160316.1
updates main 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2

Changelog

Version: 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2 2019-11-26 13:06:30 UTC

  amd64-microcode (3.20191021.1+really3.20180524.1~ubuntu0.16.04.2) xenial-security; urgency=medium

  * Revert to 3.20180524.1 version of microcode because of regressions on
    certain hardware. (LP: #1853614)

 -- Marc Deslauriers <email address hidden> Mon, 25 Nov 2019 14:55:10 -0500

Source diff to previous version
1853614 System stuck in reboot loop on AMD EPYC 7542 32-Core Processor

Version: 3.20191021.1ubuntu0.16.04.1 2019-11-21 01:07:07 UTC

  amd64-microcode (3.20191021.1ubuntu0.16.04.1) xenial; urgency=medium

  * Backport to Ubuntu 16.04 LTS (LP: #1850752)

Source diff to previous version
1850752 Update amd64-microcode to 20191022 for 17h family

Version: 3.20180524.1~ubuntu0.16.04.1 2018-06-20 23:06:56 UTC

  amd64-microcode (3.20180524.1~ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Add Spectre Variant 2 protection for family 17h AMD
    processors (CVE-2017-5715)
    - Backport to xenial.

Source diff to previous version
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at

Version: 2.20160316.1 2018-01-13 11:06:58 UTC

  amd64-microcode (2.20160316.1) unstable; urgency=critical

  * Upstream release 20160316 built from linux-firmware:
    + Updated Microcodes:
      sig 0x00600f20, patch id 0x0600084f, 2016-01-25
    + This microcode updates fixes a critical erratum on NMI handling
      introduced by microcode patch id 0x6000832 from the 20141028 update.
      The erratum is also present on microcode patch id 0x6000836.
    + THIS IS A CRITICAL STABILITY AND SECURITY UPDATE FOR THE EARLIER
      AMD PILEDRIVER PROCESSORS, including:
      + AMD Opteron 3300, 4300, 6300
      + AMD FX "Vishera" (43xx, 63xx, 83xx, 93xx, 95xx)
      + AMD processors with family 21, model 2, stepping 0
  * Robert Święcki, while fuzzing the kernel using the syzkaller tool,
    uncovered very strange behavior on an AMD FX-8320, later reproduced on
    other AMD Piledriver model 2, stepping 0 processors including the Opteron
    6300. Robert discovered, using his proof-of-concept exploit code, that
    the incorrect behavior allows an unpriviledged attacker on an unpriviledged
    VM to corrupt the return stack of the host kernel's NMI handler. At best,
    this results in unpredictable host behavior. At worst, it allows for an
    unpriviledged user on unpriviledged VM to carry a sucessful host-kernel
    ring 0 code injection attack.
  * The erratum is timing-dependant, easily triggered by workloads that cause
    a high number of NMIs, such as running the "perf" tool.

 -- Henrique de Moraes Holschuh <email address hidden> Sat, 19 Mar 2016 14:02:44 -0300




About   -   Send Feedback to @ubuntu_updates