UbuntuUpdates.org

Package "intel-microcode"

Name: intel-microcode

Description:

Processor microcode firmware for Intel CPUs

Latest version: 3.20210216.0ubuntu0.16.04.1
Release: xenial (16.04)
Level: security
Repository: main
Homepage: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files

Links


Download "intel-microcode"


Other versions of "intel-microcode" in Xenial

Repository Area Version
base restricted 3.20151106.1
updates main 3.20210216.0ubuntu0.16.04.1

Changelog

Version: 3.20191115.1ubuntu0.16.04.2 2019-12-05 14:07:07 UTC

  intel-microcode (3.20191115.1ubuntu0.16.04.2) xenial-security; urgency=medium

  * REGRESSION UPDATE: warm reboots cause hangs on certain Skylake
    processors (LP: #1854764)
    + Reverted microcode (from revision 0x2000065):
      sig 0x00050654, pf_mask 0xb7, 2019-07-31, rev 0x2000064, size 33792

 -- Steve Beattie <email address hidden> Mon, 02 Dec 2019 12:53:04 -0800

Source diff to previous version
1854764 Dell 5280 hangs on warm reboot after upgrading intel-microcode package

Version: 3.20191115.1ubuntu0.16.04.1 2019-11-21 01:07:07 UTC

  intel-microcode (3.20191115.1ubuntu0.16.04.1) xenial-security; urgency=medium

  * Backport from debian unstable:
    - Unexpected Page Faults in Guest Virtualization
      Environment (SKL-188, KBL-144, CFL-136 errata)
  * Remaining Ubuntu changes
    - debian/initramfs.hook: Do not override preset defaults from
      auto-exported conf snippets loaded by initramfs-tools.

Source diff to previous version

Version: 3.20191112-0ubuntu0.16.04.2 2019-11-12 22:07:07 UTC

  intel-microcode (3.20191112-0ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode data release 20191112
    CVE-2019-11135, CVE-2019-11139
    + New Microcodes:
      sig 0x000406d8, pf_mask 0x01, 2019-09-16, rev 0x012d, size 84992
      sig 0x00050653, pf_mask 0x97, 2019-09-09, rev 0x1000151, size 32768
      sig 0x00050656, pf_mask 0xbf, 2019-09-05, rev 0x400002c, size 51200
      sig 0x00060663, pf_mask 0x80, 2018-04-17, rev 0x002a, size 87040
      sig 0x000706a8, pf_mask 0x01, 2019-08-29, rev 0x0016, size 74752
      sig 0x000706e5, pf_mask 0x80, 2019-10-07, rev 0x004e, size 103424
      sig 0x000a0660, pf_mask 0x80, 2019-08-27, rev 0x00c6, size 91136
    + Updated Microcodes:
      sig 0x000406e3, pf_mask 0xc0, 2019-08-14, rev 0x00d4, size 101376
      sig 0x00050654, pf_mask 0xb7, 2019-09-05, rev 0x2000065, size 34816
      sig 0x00050657, pf_mask 0xbf, 2019-09-05, rev 0x500002c, size 51200
      sig 0x000506e3, pf_mask 0x36, 2019-08-14, rev 0x00d4, size 101376
      sig 0x000706a1, pf_mask 0x01, 2019-08-28, rev 0x0032, size 73728
      sig 0x000806e9, pf_mask 0x10, 2019-08-14, rev 0x00c6, size 99328
      sig 0x000806e9, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 100352
      sig 0x000806ea, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 99328
      sig 0x000806eb, pf_mask 0xd0, 2019-08-14, rev 0x00c6, size 100352
      sig 0x000806ec, pf_mask 0x94, 2019-08-14, rev 0x00c6, size 100352
      sig 0x000906e9, pf_mask 0x2a, 2019-04-30, rev 0x00ba, size 99328
      sig 0x000906ea, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328
      sig 0x000906eb, pf_mask 0x02, 2019-08-14, rev 0x00c6, size 100352
      sig 0x000906ed, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328
  * Remaining Ubuntu changes:
    - debian/initramfs.hook: Do not override preset defaults from
      auto-exported conf snippets loaded by initramfs-tools.

Source diff to previous version
CVE-2019-11135 TSX Asynchronous Abort
CVE-2019-11139 RESERVED

Version: 3.20190618.0ubuntu0.16.04.1 2019-06-20 20:07:15 UTC

  intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20190618
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    + Updated Microcodes:
      sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
      sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
      sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
    + Add MDS mitigation support for Sandy Bridge server and Core-X
      processor families.(LP: #1830123)

 -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700

Source diff to previous version
1830123 intel-microcode 20190514 does not provide Sandy Bridge (sigs 0x000206d7 and 0x000206d6)
CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling
CVE-2018-12127 MLPDS Microarchitectural Load Port Data Sampling
CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling
CVE-2019-11091 MDSUM Microarchitectural Data Sampling Uncacheable Memory

Version: 3.20190514.0ubuntu0.16.04.2 2019-05-22 22:06:21 UTC

  intel-microcode (3.20190514.0ubuntu0.16.04.2) xenial-security; urgency=medium

  * Update to final 20190514 microcode update. (LP: #1829745)
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    + New Microcodes:
      sig 0x00030678, pf_mask 0x02, 2016.04-22, rev 0x0838, size 52224
      sig 0x00030678, pf_mask 0x0c, 2016.04-22, rev 0x0838, size 52224
      sig 0x00030679, pf_mask 0x0f, 2016.04-23, rev 0x090c, size 52224
      sig 0x000406c3, pf_mask 0x01, 2016.04-23, rev 0x0368, size 69632
      sig 0x000406c4, pf_mask 0x01, 2016.04-23, rev 0x0411, size 68608
    + Add MDS mitigation support for Cherry Trail and Bay Trail
      processor families.

  [ Dimitri John Ledkov ]
  * Do not override preset defaults from auto-exported conf snippets
    loaded by initramfs-tools. This thus allows other hooks, or
    alternative confdir override the built-in defaults at mkinitramfs
    time. Specifically to support generating installer/golden/bare-metal
    initrds with all microcodes for any hardware.

 -- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700

1829745 3.20190514.0ubuntu0 actually contains version 20190507 Release
CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling
CVE-2018-12127 MLPDS Microarchitectural Load Port Data Sampling
CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling
CVE-2019-11091 MDSUM Microarchitectural Data Sampling Uncacheable Memory



About   -   Send Feedback to @ubuntu_updates