[ubuntu/questing-proposed] intel-microcode 3.20250512.1ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue May 20 13:20:16 UTC 2025


intel-microcode (3.20250512.1ubuntu1) questing; urgency=medium

  * SECURITY UPDATE: Merge from Debian unstable; remaining changes:
    - debian/control: Add dracut and tiny-initramfs as alternative
      recommends
    - debian/tests/initramfs: update test for location of GenuineIntel.bin
      since in Ubuntu this lives under the cpio2 initramfs so test for
      its presence in any cpio
    - debian/tests/control: update generic kernel dep as an alternative to
      the original one from Debian
    - debian/tests/initramfs: invoke update-initramfs with -c to ensure an
      initrd is generated if one does not already exist so that the rest
      of the test can proceed as expected

intel-microcode (3.20250512.1) unstable; urgency=high

  * New upstream microcode datafile 20250512 (closes: #1105172)
    - Mitigations for INTEL-SA-01153 (ITS: Indirect Target Selection):
      CVE-2024-28956: Processor may incompletely mitigate Branch Target
      Injection due to indirect branch predictions that are not fully
      constrained by eIBRS nor by the IBPB barrier.  Part of the "Training
      Solo" set of vulnerabilities.
    - Mitigations for INTEL-SA-01244:
      CVE-2025-20103: Insufficient resource pool in the core management
      mechanism for some Intel Processors may allow an authenticated user
      to potentially enable denial of service via local access.
      CVE-2025-20054: Uncaught exception in the core management mechanism
      for some Intel Processors may allow an authenticated user to
      potentially enable denial of service via local access.
    - Mitigations for INTEL-SA-01247:
      CVE-2024-43420, CVE-2025-20623: Exposure of sensitive information
      caused by shared microarchitectural predictor state that influences
      transient execution for some Intel Atom and some Intel Core
      processors (10th Generation) may allow an authenticated user to
      potentially enable information disclosure via local access.
      CVE-2024-45332 (Branch Privilege Injection): Exposure of sensitive
      information caused by shared microarchitectural predictor state that
      influences transient execution in the indirect branch predictors for
      some Intel Processors may allow an authenticated user to potentially
      enable information disclosure via local access.
    - Mitigations for INTEL-SA-01322:
      CVE-2025-24495 (Training Solo): Incorrect initialization of resource
      in the branch prediction unit for some Intel Core Ultra Processors
      may allow an authenticated user to potentially enable information
      disclosure via local access (IBPB bypass)
      CVE-2025-20012 (Training Solo): Incorrect behavior order for some
      Intel Core Ultra Processors may allow an unauthenticated user to
      potentially enable information disclosure via physical access.
    - Improved fix for the Vmin Shift Instability for the Intel Core 13th
      and 14th gen processors under low-activity scenarios (sig 0xb0671).
      This microcode update is supposed to be delivered as a system
      firmware update, but according to Intel it should be effective when
      loaded by the operating system if the system firmware has revision
      0x12e.
    - Fixes for unspecified functional issues on several processor models
  * New microcodes or new extended signatures:
    sig 0x000a06d1, pf_mask 0x95, 2025-02-07, rev 0x10003a2, size 1664000
    sig 0x000a06d1, pf_mask 0x20, 2025-02-07, rev 0xa0000d1, size 1635328
    sig 0x000b0650, pf_mask 0x80, 2025-03-18, rev 0x000a, size 136192
    sig 0x000b06d1, pf_mask 0x80, 2025-03-18, rev 0x011f, size 79872
    sig 0x000c0662, pf_mask 0x82, 2025-03-20, rev 0x0118, size 90112
    sig 0x000c06a2, pf_mask 0x82, 2025-03-20, rev 0x0118
    sig 0x000c0652, pf_mask 0x82, 2025-03-20, rev 0x0118
    sig 0x000c0664, pf_mask 0x82, 2025-03-20, rev 0x0118
  * Updated microcodes:
    sig 0x00050657, pf_mask 0xbf, 2024-12-12, rev 0x5003901, size 39936
    sig 0x0005065b, pf_mask 0xbf, 2024-12-12, rev 0x7002b01, size 30720
    sig 0x000606a6, pf_mask 0x87, 2025-01-07, rev 0xd000404, size 309248
    sig 0x000606c1, pf_mask 0x10, 2025-01-07, rev 0x10002d0, size 300032
    sig 0x000706a8, pf_mask 0x01, 2024-12-05, rev 0x0026, size 76800
    sig 0x000706e5, pf_mask 0x80, 2025-01-07, rev 0x00ca, size 115712
    sig 0x000806c1, pf_mask 0x80, 2024-12-01, rev 0x00bc, size 112640
    sig 0x000806c2, pf_mask 0xc2, 2024-12-01, rev 0x003c, size 99328
    sig 0x000806d1, pf_mask 0xc2, 2024-12-11, rev 0x0056, size 105472
    sig 0x000806ec, pf_mask 0x94, 2024-11-17, rev 0x0100, size 106496
    sig 0x000806f8, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
    sig 0x000806f7, pf_mask 0x87, 2025-01-28, rev 0x2b000639
    sig 0x000806f6, pf_mask 0x87, 2025-01-28, rev 0x2b000639
    sig 0x000806f5, pf_mask 0x87, 2025-01-28, rev 0x2b000639
    sig 0x000806f4, pf_mask 0x87, 2025-01-28, rev 0x2b000639
    sig 0x000806f8, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7, size 624640
    sig 0x000806f6, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7
    sig 0x000806f5, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7
    sig 0x000806f4, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7
    sig 0x00090672, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
    sig 0x00090675, pf_mask 0x07, 2024-12-12, rev 0x003a
    sig 0x000b06f2, pf_mask 0x07, 2024-12-12, rev 0x003a
    sig 0x000b06f5, pf_mask 0x07, 2024-12-12, rev 0x003a
    sig 0x000b06f6, pf_mask 0x07, 2024-12-12, rev 0x003a
    sig 0x000b06f7, pf_mask 0x07, 2024-12-12, rev 0x003a
    sig 0x000906a3, pf_mask 0x80, 2024-12-12, rev 0x0437, size 224256
    sig 0x000906a4, pf_mask 0x80, 2024-12-12, rev 0x0437
    sig 0x000906a4, pf_mask 0x40, 2024-12-06, rev 0x000a, size 119808
    sig 0x000906ed, pf_mask 0x22, 2024-11-14, rev 0x0104, size 106496
    sig 0x000a0652, pf_mask 0x20, 2024-11-14, rev 0x0100, size 97280
    sig 0x000a0653, pf_mask 0x22, 2024-11-14, rev 0x0100, size 98304
    sig 0x000a0655, pf_mask 0x22, 2024-11-14, rev 0x0100, size 97280
    sig 0x000a0660, pf_mask 0x80, 2024-11-14, rev 0x0102, size 98304
    sig 0x000a0661, pf_mask 0x80, 2024-11-14, rev 0x0100, size 97280
    sig 0x000a0671, pf_mask 0x02, 2024-12-01, rev 0x0064, size 108544
    sig 0x000a06a4, pf_mask 0xe6, 2025-02-13, rev 0x0024, size 140288
    sig 0x000a06f3, pf_mask 0x01, 2025-02-10, rev 0x3000341, size 1542144
    sig 0x000b0671, pf_mask 0x32, 2025-03-17, rev 0x012f, size 219136
    sig 0x000b0674, pf_mask 0x32, 2025-03-17, rev 0x012f
    sig 0x000b06a2, pf_mask 0xe0, 2025-01-15, rev 0x4128, size 224256
    sig 0x000b06a3, pf_mask 0xe0, 2025-01-15, rev 0x4128
    sig 0x000b06a8, pf_mask 0xe0, 2025-01-15, rev 0x4128
    sig 0x000b06e0, pf_mask 0x19, 2024-12-06, rev 0x001d, size 139264
    sig 0x000c06f2, pf_mask 0x87, 2025-03-14, rev 0x210002a9, size 563200
    sig 0x000c06f1, pf_mask 0x87, 2025-03-14, rev 0x210002a9
  * Removed microcodes (ES/QS steppings):
    sig 0x00050656, pf_mask 0xbf, 2023-07-28, rev 0x4003605, size 38912
    sig 0x000c06f1, pf_mask 0x87, 2025-03-14, rev 0x210002a9 [EXCLUDED]
  * Makefile: exclude QS/ES steppings 0x50656, 0xc06f1.
  * Makefile: add targets to create split F-M-S /lib/firmware dir
  * debian/rules: use new intel-ucode-{fw,fw64} Makefile targets
    Removes from the binary package the F-M-S files for extended signatures
    that were excluded by IUC_EXCLUDE.
  * source: update symlinks to reflect id of the latest release, 20250512

Date: Tue, 20 May 2025 09:08:39 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20250512.1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Tue, 20 May 2025 09:08:39 -0400
Source: intel-microcode
Built-For-Profiles: noudeb
Architecture: source
Version: 3.20250512.1ubuntu1
Distribution: questing
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Closes: 1105172
Changes:
 intel-microcode (3.20250512.1ubuntu1) questing; urgency=medium
 .
   * SECURITY UPDATE: Merge from Debian unstable; remaining changes:
     - debian/control: Add dracut and tiny-initramfs as alternative
       recommends
     - debian/tests/initramfs: update test for location of GenuineIntel.bin
       since in Ubuntu this lives under the cpio2 initramfs so test for
       its presence in any cpio
     - debian/tests/control: update generic kernel dep as an alternative to
       the original one from Debian
     - debian/tests/initramfs: invoke update-initramfs with -c to ensure an
       initrd is generated if one does not already exist so that the rest
       of the test can proceed as expected
 .
 intel-microcode (3.20250512.1) unstable; urgency=high
 .
   * New upstream microcode datafile 20250512 (closes: #1105172)
     - Mitigations for INTEL-SA-01153 (ITS: Indirect Target Selection):
       CVE-2024-28956: Processor may incompletely mitigate Branch Target
       Injection due to indirect branch predictions that are not fully
       constrained by eIBRS nor by the IBPB barrier.  Part of the "Training
       Solo" set of vulnerabilities.
     - Mitigations for INTEL-SA-01244:
       CVE-2025-20103: Insufficient resource pool in the core management
       mechanism for some Intel Processors may allow an authenticated user
       to potentially enable denial of service via local access.
       CVE-2025-20054: Uncaught exception in the core management mechanism
       for some Intel Processors may allow an authenticated user to
       potentially enable denial of service via local access.
     - Mitigations for INTEL-SA-01247:
       CVE-2024-43420, CVE-2025-20623: Exposure of sensitive information
       caused by shared microarchitectural predictor state that influences
       transient execution for some Intel Atom and some Intel Core
       processors (10th Generation) may allow an authenticated user to
       potentially enable information disclosure via local access.
       CVE-2024-45332 (Branch Privilege Injection): Exposure of sensitive
       information caused by shared microarchitectural predictor state that
       influences transient execution in the indirect branch predictors for
       some Intel Processors may allow an authenticated user to potentially
       enable information disclosure via local access.
     - Mitigations for INTEL-SA-01322:
       CVE-2025-24495 (Training Solo): Incorrect initialization of resource
       in the branch prediction unit for some Intel Core Ultra Processors
       may allow an authenticated user to potentially enable information
       disclosure via local access (IBPB bypass)
       CVE-2025-20012 (Training Solo): Incorrect behavior order for some
       Intel Core Ultra Processors may allow an unauthenticated user to
       potentially enable information disclosure via physical access.
     - Improved fix for the Vmin Shift Instability for the Intel Core 13th
       and 14th gen processors under low-activity scenarios (sig 0xb0671).
       This microcode update is supposed to be delivered as a system
       firmware update, but according to Intel it should be effective when
       loaded by the operating system if the system firmware has revision
       0x12e.
     - Fixes for unspecified functional issues on several processor models
   * New microcodes or new extended signatures:
     sig 0x000a06d1, pf_mask 0x95, 2025-02-07, rev 0x10003a2, size 1664000
     sig 0x000a06d1, pf_mask 0x20, 2025-02-07, rev 0xa0000d1, size 1635328
     sig 0x000b0650, pf_mask 0x80, 2025-03-18, rev 0x000a, size 136192
     sig 0x000b06d1, pf_mask 0x80, 2025-03-18, rev 0x011f, size 79872
     sig 0x000c0662, pf_mask 0x82, 2025-03-20, rev 0x0118, size 90112
     sig 0x000c06a2, pf_mask 0x82, 2025-03-20, rev 0x0118
     sig 0x000c0652, pf_mask 0x82, 2025-03-20, rev 0x0118
     sig 0x000c0664, pf_mask 0x82, 2025-03-20, rev 0x0118
   * Updated microcodes:
     sig 0x00050657, pf_mask 0xbf, 2024-12-12, rev 0x5003901, size 39936
     sig 0x0005065b, pf_mask 0xbf, 2024-12-12, rev 0x7002b01, size 30720
     sig 0x000606a6, pf_mask 0x87, 2025-01-07, rev 0xd000404, size 309248
     sig 0x000606c1, pf_mask 0x10, 2025-01-07, rev 0x10002d0, size 300032
     sig 0x000706a8, pf_mask 0x01, 2024-12-05, rev 0x0026, size 76800
     sig 0x000706e5, pf_mask 0x80, 2025-01-07, rev 0x00ca, size 115712
     sig 0x000806c1, pf_mask 0x80, 2024-12-01, rev 0x00bc, size 112640
     sig 0x000806c2, pf_mask 0xc2, 2024-12-01, rev 0x003c, size 99328
     sig 0x000806d1, pf_mask 0xc2, 2024-12-11, rev 0x0056, size 105472
     sig 0x000806ec, pf_mask 0x94, 2024-11-17, rev 0x0100, size 106496
     sig 0x000806f8, pf_mask 0x87, 2025-01-28, rev 0x2b000639, size 591872
     sig 0x000806f7, pf_mask 0x87, 2025-01-28, rev 0x2b000639
     sig 0x000806f6, pf_mask 0x87, 2025-01-28, rev 0x2b000639
     sig 0x000806f5, pf_mask 0x87, 2025-01-28, rev 0x2b000639
     sig 0x000806f4, pf_mask 0x87, 2025-01-28, rev 0x2b000639
     sig 0x000806f8, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7, size 624640
     sig 0x000806f6, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7
     sig 0x000806f5, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7
     sig 0x000806f4, pf_mask 0x10, 2025-01-28, rev 0x2c0003f7
     sig 0x00090672, pf_mask 0x07, 2024-12-12, rev 0x003a, size 226304
     sig 0x00090675, pf_mask 0x07, 2024-12-12, rev 0x003a
     sig 0x000b06f2, pf_mask 0x07, 2024-12-12, rev 0x003a
     sig 0x000b06f5, pf_mask 0x07, 2024-12-12, rev 0x003a
     sig 0x000b06f6, pf_mask 0x07, 2024-12-12, rev 0x003a
     sig 0x000b06f7, pf_mask 0x07, 2024-12-12, rev 0x003a
     sig 0x000906a3, pf_mask 0x80, 2024-12-12, rev 0x0437, size 224256
     sig 0x000906a4, pf_mask 0x80, 2024-12-12, rev 0x0437
     sig 0x000906a4, pf_mask 0x40, 2024-12-06, rev 0x000a, size 119808
     sig 0x000906ed, pf_mask 0x22, 2024-11-14, rev 0x0104, size 106496
     sig 0x000a0652, pf_mask 0x20, 2024-11-14, rev 0x0100, size 97280
     sig 0x000a0653, pf_mask 0x22, 2024-11-14, rev 0x0100, size 98304
     sig 0x000a0655, pf_mask 0x22, 2024-11-14, rev 0x0100, size 97280
     sig 0x000a0660, pf_mask 0x80, 2024-11-14, rev 0x0102, size 98304
     sig 0x000a0661, pf_mask 0x80, 2024-11-14, rev 0x0100, size 97280
     sig 0x000a0671, pf_mask 0x02, 2024-12-01, rev 0x0064, size 108544
     sig 0x000a06a4, pf_mask 0xe6, 2025-02-13, rev 0x0024, size 140288
     sig 0x000a06f3, pf_mask 0x01, 2025-02-10, rev 0x3000341, size 1542144
     sig 0x000b0671, pf_mask 0x32, 2025-03-17, rev 0x012f, size 219136
     sig 0x000b0674, pf_mask 0x32, 2025-03-17, rev 0x012f
     sig 0x000b06a2, pf_mask 0xe0, 2025-01-15, rev 0x4128, size 224256
     sig 0x000b06a3, pf_mask 0xe0, 2025-01-15, rev 0x4128
     sig 0x000b06a8, pf_mask 0xe0, 2025-01-15, rev 0x4128
     sig 0x000b06e0, pf_mask 0x19, 2024-12-06, rev 0x001d, size 139264
     sig 0x000c06f2, pf_mask 0x87, 2025-03-14, rev 0x210002a9, size 563200
     sig 0x000c06f1, pf_mask 0x87, 2025-03-14, rev 0x210002a9
   * Removed microcodes (ES/QS steppings):
     sig 0x00050656, pf_mask 0xbf, 2023-07-28, rev 0x4003605, size 38912
     sig 0x000c06f1, pf_mask 0x87, 2025-03-14, rev 0x210002a9 [EXCLUDED]
   * Makefile: exclude QS/ES steppings 0x50656, 0xc06f1.
   * Makefile: add targets to create split F-M-S /lib/firmware dir
   * debian/rules: use new intel-ucode-{fw,fw64} Makefile targets
     Removes from the binary package the F-M-S files for extended signatures
     that were excluded by IUC_EXCLUDE.
   * source: update symlinks to reflect id of the latest release, 20250512
Checksums-Sha1:
 3c1ce1c58fec5c1807ca636ed8032560363a291e 2007 intel-microcode_3.20250512.1ubuntu1.dsc
 000e31c9087790952094f54489ea436a9d6b74dd 11578972 intel-microcode_3.20250512.1ubuntu1.tar.xz
 bd019a03a5786d55249371e2249fd1a7769813d4 6146 intel-microcode_3.20250512.1ubuntu1_source.buildinfo
Checksums-Sha256:
 24830667fe94b14d8c55885b48b7c4a1fee636d903af72805d706dae4b89930c 2007 intel-microcode_3.20250512.1ubuntu1.dsc
 059e57bc79567dca57d125fd6aa07e9f30e969e4b40434a0ae304155141ec43f 11578972 intel-microcode_3.20250512.1ubuntu1.tar.xz
 d2c983b38a9084d93b74e3791a19029bc6b97c2e6115b2099467fcf65a4f8c4e 6146 intel-microcode_3.20250512.1ubuntu1_source.buildinfo
Files:
 619b018994610385ec693327fbabc8bf 2007 non-free-firmware/admin standard intel-microcode_3.20250512.1ubuntu1.dsc
 38d5d39e10e885aba3dcfa4383a28100 11578972 non-free-firmware/admin standard intel-microcode_3.20250512.1ubuntu1.tar.xz
 905e767ab238dca4af396b96ca07e34a 6146 non-free-firmware/admin standard intel-microcode_3.20250512.1ubuntu1_source.buildinfo
Original-Maintainer: Henrique de Moraes Holschuh <hmh at debian.org>


More information about the Questing-changes mailing list