intel-microcode 3.20240514.0ubuntu0.22.04.1 source package in Ubuntu

Changelog

intel-microcode (3.20240514.0ubuntu0.22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20240514
    - New microcodes:
      sig 0x000a06a4, pf_mask 0xe6, 2024-01-03, rev 0x001c, size 136192
      sig 0x000b06a8, pf_mask 0xe0, 2023-12-07, rev 0x4121, size 220160
      sig 0x000c06f1, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960
      sig 0x000c06f2, pf_mask 0x87, 2024-02-05, rev 0x21000230, size 552960
    - Updated microcodes:
      sig 0x00050653, pf_mask 0x97, 2023-07-28, rev 0x1000191, size 36864
      sig 0x00050656, pf_mask 0xbf, 2023-07-28, rev 0x4003605, size 38912
      sig 0x00050657, pf_mask 0xbf, 2023-07-28, rev 0x5003605, size 37888
      sig 0x0005065b, pf_mask 0xbf, 2023-08-03, rev 0x7002802, size 30720
      sig 0x00050665, pf_mask 0x10, 2023-08-03, rev 0xe000015, size 23552
      sig 0x000506f1, pf_mask 0x01, 2023-10-05, rev 0x003e, size 11264
      sig 0x000606a6, pf_mask 0x87, 2023-09-14, rev 0xd0003d1, size 307200
      sig 0x000606c1, pf_mask 0x10, 2023-12-05, rev 0x1000290, size 299008
      sig 0x000706a1, pf_mask 0x01, 2023-08-25, rev 0x0040, size 76800
      sig 0x000706a8, pf_mask 0x01, 2023-08-25, rev 0x0024, size 76800
      sig 0x000706e5, pf_mask 0x80, 2023-09-14, rev 0x00c4, size 114688
      sig 0x000806c1, pf_mask 0x80, 2023-09-13, rev 0x00b6, size 111616
      sig 0x000806c2, pf_mask 0xc2, 2023-09-13, rev 0x0036, size 98304
      sig 0x000806d1, pf_mask 0xc2, 2023-09-13, rev 0x0050, size 104448
      sig 0x000806ec, pf_mask 0x94, 2023-07-16, rev 0x00fa, size 106496
      sig 0x000806f4, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f4, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f5, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f5, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f6, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f6, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f7, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x000806f8, pf_mask 0x10, 2024-02-05, rev 0x2c000390, size 614400
      sig 0x000806f8, pf_mask 0x87, 2024-02-05, rev 0x2b0005c0, size 581632
      sig 0x00090661, pf_mask 0x01, 2023-09-26, rev 0x0019, size 20480
      sig 0x00090672, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x00090675, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000906a3, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208
      sig 0x000906a4, pf_mask 0x40, 2023-12-07, rev 0x0007, size 119808
      sig 0x000906a4, pf_mask 0x80, 2023-12-05, rev 0x0433, size 222208
      sig 0x000906c0, pf_mask 0x01, 2023-09-26, rev 0x24000026, size 20480
      sig 0x000906e9, pf_mask 0x2a, 2023-09-28, rev 0x00f8, size 108544
      sig 0x000906ea, pf_mask 0x22, 2023-07-26, rev 0x00f6, size 105472
      sig 0x000906ec, pf_mask 0x22, 2023-07-26, rev 0x00f6, size 106496
      sig 0x000906ed, pf_mask 0x22, 2023-07-27, rev 0x00fc, size 106496
      sig 0x000a0652, pf_mask 0x20, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0653, pf_mask 0x22, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0655, pf_mask 0x22, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0660, pf_mask 0x80, 2023-07-16, rev 0x00fa, size 97280
      sig 0x000a0661, pf_mask 0x80, 2023-07-16, rev 0x00fa, size 96256
      sig 0x000a0671, pf_mask 0x02, 2023-09-14, rev 0x005e, size 108544
      sig 0x000b0671, pf_mask 0x32, 2024-01-25, rev 0x0123, size 215040
      sig 0x000b06a2, pf_mask 0xe0, 2023-12-07, rev 0x4121, size 220160
      sig 0x000b06a3, pf_mask 0xe0, 2023-12-07, rev 0x4121, size 220160
      sig 0x000b06e0, pf_mask 0x11, 2023-12-07, rev 0x0017, size 138240
      sig 0x000b06f2, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
      sig 0x000b06f5, pf_mask 0x07, 2023-12-05, rev 0x0035, size 224256
    - CVE-2023-45733 (INTEL-SA-01051)
    - CVE-2023-46103 (INTEL-SA-01052)
    - CVE-2023-45745 (INTEL-SA-01036)
    - CVE-2023-47855 (INTEL-SA-01036)
    - CVE-2023-39368 (INTEL-SA-00972)
    - CVE-2023-38575 (INTEL-SA-00982)
    - CVE-2023-28746 (INTEL-SA-00898)
    - CVE-2023-22655 (INTEL-SA-00960)
    - CVE-2023-43490 (INTEL-SA-01045)
  * source: update symlinks to reflect id of the latest release, 20240514

 -- Alex Murray <email address hidden>  Wed, 15 May 2024 13:47:34 +0930

Upload details

Uploaded by:
Alex Murray
Uploaded to:
Jammy
Original maintainer:
Ubuntu Developers
Architectures:
i386 amd64 x32
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Jammy updates main admin
Jammy security main admin

Builds

Jammy: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
intel-microcode_3.20240514.0ubuntu0.22.04.1.tar.xz 7.2 MiB a9f4034f873288e92c9cd0cb968ca6472269908f30638f3b32da6b2a34e89aff
intel-microcode_3.20240514.0ubuntu0.22.04.1.dsc 1.6 KiB c8ce20ea7313138114b5cc426fe39c53cc2f28e1d740e7b16e397790302de560

View changes file

Binary packages built by this source

intel-microcode: Processor microcode firmware for Intel CPUs

 This package contains updated system processor microcode for
 Intel i686 and Intel X86-64 processors. Intel releases microcode
 updates to correct processor behavior as documented in the
 respective processor specification updates.
 .
 For AMD processors, please refer to the amd64-microcode package.