mirror of
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
synced 2024-09-21 09:57:26 +00:00
microcode-20191112 Release
This commit is contained in:
parent
5ada2f32ed
commit
bd812496d3
BIN
intel-ucode/06-4d-08
Normal file
BIN
intel-ucode/06-4d-08
Normal file
Binary file not shown.
Binary file not shown.
BIN
intel-ucode/06-55-03
Normal file
BIN
intel-ucode/06-55-03
Normal file
Binary file not shown.
Binary file not shown.
BIN
intel-ucode/06-55-06
Normal file
BIN
intel-ucode/06-55-06
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
intel-ucode/06-66-03
Normal file
BIN
intel-ucode/06-66-03
Normal file
Binary file not shown.
Binary file not shown.
BIN
intel-ucode/06-7a-08
Normal file
BIN
intel-ucode/06-7a-08
Normal file
Binary file not shown.
BIN
intel-ucode/06-7e-05
Normal file
BIN
intel-ucode/06-7e-05
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
intel-ucode/06-a6-00
Normal file
BIN
intel-ucode/06-a6-00
Normal file
Binary file not shown.
40
releasenote
40
releasenote
@ -82,21 +82,35 @@ OS vendors must ensure that the late loader patches (provided in
|
|||||||
linux-kernel-patches\) are included in the distribution before packaging the
|
linux-kernel-patches\) are included in the distribution before packaging the
|
||||||
BDX-ML microcode for late-loading.
|
BDX-ML microcode for late-loading.
|
||||||
|
|
||||||
== 20190918 Release ==
|
== 20191112 Release ==
|
||||||
-- Updates upon 20190618 release --
|
-- Updates upon 20190918 release --
|
||||||
Processor Identifier Version Products
|
Processor Identifier Version Products
|
||||||
Model Stepping F-MO-S/PI Old->New
|
Model Stepping F-MO-S/PI Old->New
|
||||||
---- new platforms ----------------------------------------
|
---- new platforms ----------------------------------------
|
||||||
|
AVN B0/C0 6-4d-8/01 0000012D Atom C2xxx
|
||||||
|
CML-U62 A0 6-a6-0/80 000000c6 Core Gen10 Mobile
|
||||||
|
CNL-U D0 6-66-3/80 0000002a Core Gen8 Mobile
|
||||||
|
SKX-SP B1 6-55-3/97 01000151 Xeon Scalable
|
||||||
|
GKL B0 6-7a-1/01 00000032 Pentium J5005/N5000, Celeron J4005/J4105/N4000/N4100
|
||||||
|
GKL-R R0 6-7a-8/01 00000016 Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
|
||||||
|
ICL U/Y D1 6-7e-5/80 00000046 Core Gen10 Mobile
|
||||||
|
|
||||||
---- updated platforms ------------------------------------
|
---- updated platforms ------------------------------------
|
||||||
BDW-U/Y E0/F0 6-3d-4/c0 0000002d->0000002e Core Gen5
|
SKL U/Y D0 6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile
|
||||||
HSX-EX E0 6-3f-4/80 00000014->00000016 Xeon E7 v3
|
SKX-SP H0/M0/U0 6-55-4/b7 02000064->00000065 Xeon Scalable
|
||||||
BDW-H/E3 E0/G0 6-47-1/22 00000020->00000021 Core Gen5
|
SKX-D M1 6-55-4/b7 02000064->00000065 Xeon D-21xx
|
||||||
BDX-ML B0/M0/R0 6-4f-1/ef 0b000036->0b000038 Xeon E5/E7 v4; Core i7-69xx/68xx
|
CLX-SP B0 6-55-6/bf 0400002b->0400002c Xeon Scalable Gen2
|
||||||
BDX-DE V1 6-56-2/10 0000001a->0000001c Xeon D-1520/40
|
CLX-SP B1 6-55-7/bf 0500002b->0500002c Xeon Scalable Gen2
|
||||||
BDX-DE V2/3 6-56-3/10 07000017->07000019 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
|
SKL H/S/E3 R0/N0 6-5e-3/36 000000cc->000000d4 Core Gen6
|
||||||
BDX-DE Y0 6-56-4/10 0f000015->0f000017 Xeon D-1557/59/67/71/77/81/87
|
AML-Y22 H0 6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile
|
||||||
BDX-NS A0 6-56-5/10 0e00000d->0e00000f Xeon D-1513N/23/33/43/53
|
KBL-U/Y H0 6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile
|
||||||
SKX-SP H0/M0/U0 6-55-4/b7 0200005e->00000064 Xeon Scalable
|
CFL-U43e D0 6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile
|
||||||
SKX-D M1 6-55-4/b7 0200005e->00000064 Xeon D-21xx
|
WHL-U W0 6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile
|
||||||
CLX-SP B1 6-55-7/bf 05000021->0500002b Xeon Scalable Gen2
|
AML-Y V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
|
||||||
|
CML-U42 V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
|
||||||
|
WHL-U V0 6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile
|
||||||
|
KBL-G/X H0 6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8
|
||||||
|
KBL-H/S/E3 B0 6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6
|
||||||
|
CFL-H/S/E3 U0 6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, Mobile, Xeon E
|
||||||
|
CFL-S B0 6-9e-b/02 000000b4->000000c6 Core Gen8
|
||||||
|
CFL-H R0 6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile
|
39
security.md
Normal file
39
security.md
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
## Report a Vulnerability
|
||||||
|
|
||||||
|
If you have information about a security issue or vulnerability with an **Intel branded product or technology**, please send an e-mail to [secure@intel.com](mailto:secure@intel.com). Encrypt sensitive information using our [PGP public key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html).
|
||||||
|
|
||||||
|
Please provide as much information as possible, including:
|
||||||
|
|
||||||
|
- The products and versions affected
|
||||||
|
- Detailed description of the vulnerability
|
||||||
|
- Information on known exploits
|
||||||
|
|
||||||
|
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:
|
||||||
|
|
||||||
|
- [Vulnerability handling guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html)
|
||||||
|
|
||||||
|
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact [Intel's External Security Research team](mailto:external.security.research@intel.com).
|
||||||
|
|
||||||
|
## Intel's Bug Bounty Program
|
||||||
|
|
||||||
|
Intel Corporation believes that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities in Intel products.
|
||||||
|
|
||||||
|
Like other major technology companies, Intel incentivizes security researchers to report security vulnerabilities in Intel products to us to enable a coordinated response. To encourage closer collaboration with the security research community on these kinds of issues, Intel created its Bug Bounty Program.
|
||||||
|
|
||||||
|
If you believe you've found a security vulnerability in an Intel product or technology, we encourage you to notify us through our program and work with us to mitigate and to coordinate disclosure of the vulnerability.
|
||||||
|
|
||||||
|
[Read full details.](https://www.intel.com/content/www/us/en/security-center/bug-bounty-program.html)
|
||||||
|
|
||||||
|
## Need product support?
|
||||||
|
|
||||||
|
The [secure@intel.com](mailto:secure@intel.com) e-mail address should only be used for reporting security issues.
|
||||||
|
|
||||||
|
If you...
|
||||||
|
|
||||||
|
- Have questions about the security features of an Intel product
|
||||||
|
- Require technical support
|
||||||
|
- Want product updates or patches
|
||||||
|
|
||||||
|
Please visit [Support & Downloads](https://www.intel.com/content/www/us/en/support.html).
|
Loading…
Reference in New Issue
Block a user