Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package ucode-intel for openSUSE:Factory checked in at 2025-02-12 21:31:16 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ucode-intel (Old) and /work/SRC/openSUSE:Factory/.ucode-intel.new.8181 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ucode-intel" Wed Feb 12 21:31:16 2025 rev:75 rq:1245388 version:20250211 Changes: -------- --- /work/SRC/openSUSE:Factory/ucode-intel/ucode-intel.changes 2024-11-14 16:08:04.657241141 +0100 +++ /work/SRC/openSUSE:Factory/.ucode-intel.new.8181/ucode-intel.changes 2025-02-12 21:31:49.430964909 +0100 @@ -1,0 +2,77 @@ +Wed Feb 12 13:14:00 UTC 2025 - Marcus Meissner <[email protected]> + +- Intel CPU Microcode was updated to the 20250211 release (bsc#1237096) + - Security updates for INTEL-SA-01166 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html + * CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware + Logic for some Intel Processors may allow privileged user to + potentially enable denial of service via local access. + - Security updates for INTEL-SA-01213 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html + * CVE-2024-36293: A potential security vulnerability in some Intel + Software Guard Extensions (Intel SGX) Platforms may allow denial + of service. Intel is releasing microcode updates to mitigate this + potential vulnerability. + - Security updates for INTEL-SA-01139 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + * not clear which CVEs are fixed here, and which are in UEFI BIOS updates. + - Security updates for INTEL-SA-01228 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html + * CVE-2024-39355: A potential security vulnerability in some + 13th and 14th Generation Intel Core Processors may allow denial + of service. Intel is releasing microcode and UEFI reference code + updates to mitigate this potential vulnerability. + - Security updates for INTEL-SA-01194 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html + * CVE-2024-37020: A potential security vulnerability in the Intel + Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors + may allow denial of service. Intel is releasing software updates to + mitigate this potential vulnerability. + - Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details. + - Update for functional issues. Refer to 13th/14th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details. + - Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details. + - Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details. + - Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details. + - Update for functional issues. Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details. + - Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details. + - Update for functional issues. Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details. + - Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details. + - Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details. + - Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details. + - Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details + + ### New Platforms + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + | SRF-SP | C0 | 06-af-03/01 | | 03000330 | Xeon 6700-Series Processors with E-Cores + + ### Updated Platforms + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + | ADL | C0 | 06-97-02/07 | 00000037 | 00000038 | Core Gen12 + | ADL | H0 | 06-97-05/07 | 00000037 | 00000038 | Core Gen12 + | ADL | L0 | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12 + | ADL | R0 | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12 + | ADL-N | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E + | AZB | A0/R0 | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100 + | CFL-H | R0 | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile + | CFL-H/S/E3 | U0 | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E + | EMR-SP | A0 | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5 + | EMR-SP | A1 | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5 + | ICL-D | B0 | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx + | ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3 + | RPL-E/HX/S | B0 | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14 + | RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13 + | RPL-HX/S | C0 | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14 + | RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13 + | RPL-S | H0 | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14 + | RKL-S | B0 | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11 + | SPR-HBM | Bx | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max + | SPR-SP | E4/S2 | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 + | SPR-SP | E5/S3 | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 + | TWL | N0 | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E + + ### New Disclosures Updated in Prior Releases + + | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products + |:---------------|:---------|:------------|:---------|:---------|:--------- + | CFL-H/S | P0 | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 + +------------------------------------------------------------------- Old: ---- microcode-20241112.tar.gz New: ---- microcode-20250211.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ucode-intel.spec ++++++ --- /var/tmp/diff_new_pack.zYUkeh/_old 2025-02-12 21:31:50.567011741 +0100 +++ /var/tmp/diff_new_pack.zYUkeh/_new 2025-02-12 21:31:50.571011906 +0100 @@ -1,7 +1,7 @@ # # spec file for package ucode-intel # -# Copyright (c) 2024 SUSE LLC +# Copyright (c) 2025 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -20,7 +20,7 @@ %define _firmwaredir /lib/firmware %endif Name: ucode-intel -Version: 20241112 +Version: 20250211 Release: 0 Summary: Microcode Updates for Intel x86/x86-64 CPUs License: SUSE-Firmware ++++++ microcode-20241112.tar.gz -> microcode-20250211.tar.gz ++++++ /work/SRC/openSUSE:Factory/ucode-intel/microcode-20241112.tar.gz /work/SRC/openSUSE:Factory/.ucode-intel.new.8181/microcode-20250211.tar.gz differ: char 20, line 1
