Skip to content

Commit bd81249

Browse files
microcode-20191112 Release
1 parent 5ada2f3 commit bd81249

23 files changed

+66
-13
lines changed

Diff for: intel-ucode/06-4d-08

83 KB
Binary file not shown.

Diff for: intel-ucode/06-4e-03

1 KB
Binary file not shown.

Diff for: intel-ucode/06-55-03

32 KB
Binary file not shown.

Diff for: intel-ucode/06-55-04

1 KB
Binary file not shown.

Diff for: intel-ucode/06-55-06

50 KB
Binary file not shown.

Diff for: intel-ucode/06-55-07

0 Bytes
Binary file not shown.

Diff for: intel-ucode/06-5e-03

1 KB
Binary file not shown.

Diff for: intel-ucode/06-66-03

85 KB
Binary file not shown.

Diff for: intel-ucode/06-7a-01

0 Bytes
Binary file not shown.

Diff for: intel-ucode/06-7a-08

73 KB
Binary file not shown.

Diff for: intel-ucode/06-7e-05

100 KB
Binary file not shown.

Diff for: intel-ucode/06-8e-09

2 KB
Binary file not shown.

Diff for: intel-ucode/06-8e-0a

0 Bytes
Binary file not shown.

Diff for: intel-ucode/06-8e-0b

2 KB
Binary file not shown.

Diff for: intel-ucode/06-8e-0c

3 KB
Binary file not shown.

Diff for: intel-ucode/06-9e-09

1 KB
Binary file not shown.

Diff for: intel-ucode/06-9e-0a

1 KB
Binary file not shown.

Diff for: intel-ucode/06-9e-0b

1 KB
Binary file not shown.

Diff for: intel-ucode/06-9e-0c

-96 KB
Binary file not shown.

Diff for: intel-ucode/06-9e-0d

2 KB
Binary file not shown.

Diff for: intel-ucode/06-a6-00

89 KB
Binary file not shown.

Diff for: releasenote

+27-13
Original file line numberDiff line numberDiff line change
@@ -82,21 +82,35 @@ OS vendors must ensure that the late loader patches (provided in
8282
linux-kernel-patches\) are included in the distribution before packaging the
8383
BDX-ML microcode for late-loading.
8484

85-
== 20190918 Release ==
86-
-- Updates upon 20190618 release --
85+
== 20191112 Release ==
86+
-- Updates upon 20190918 release --
8787
Processor Identifier Version Products
8888
Model Stepping F-MO-S/PI Old->New
8989
---- new platforms ----------------------------------------
90+
AVN B0/C0 6-4d-8/01 0000012D Atom C2xxx
91+
CML-U62 A0 6-a6-0/80 000000c6 Core Gen10 Mobile
92+
CNL-U D0 6-66-3/80 0000002a Core Gen8 Mobile
93+
SKX-SP B1 6-55-3/97 01000151 Xeon Scalable
94+
GKL B0 6-7a-1/01 00000032 Pentium J5005/N5000, Celeron J4005/J4105/N4000/N4100
95+
GKL-R R0 6-7a-8/01 00000016 Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
96+
ICL U/Y D1 6-7e-5/80 00000046 Core Gen10 Mobile
9097

9198
---- updated platforms ------------------------------------
92-
BDW-U/Y E0/F0 6-3d-4/c0 0000002d->0000002e Core Gen5
93-
HSX-EX E0 6-3f-4/80 00000014->00000016 Xeon E7 v3
94-
BDW-H/E3 E0/G0 6-47-1/22 00000020->00000021 Core Gen5
95-
BDX-ML B0/M0/R0 6-4f-1/ef 0b000036->0b000038 Xeon E5/E7 v4; Core i7-69xx/68xx
96-
BDX-DE V1 6-56-2/10 0000001a->0000001c Xeon D-1520/40
97-
BDX-DE V2/3 6-56-3/10 07000017->07000019 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
98-
BDX-DE Y0 6-56-4/10 0f000015->0f000017 Xeon D-1557/59/67/71/77/81/87
99-
BDX-NS A0 6-56-5/10 0e00000d->0e00000f Xeon D-1513N/23/33/43/53
100-
SKX-SP H0/M0/U0 6-55-4/b7 0200005e->00000064 Xeon Scalable
101-
SKX-D M1 6-55-4/b7 0200005e->00000064 Xeon D-21xx
102-
CLX-SP B1 6-55-7/bf 05000021->0500002b Xeon Scalable Gen2
99+
SKL U/Y D0 6-4e-3/c0 000000cc->000000d4 Core Gen6 Mobile
100+
SKX-SP H0/M0/U0 6-55-4/b7 02000064->00000065 Xeon Scalable
101+
SKX-D M1 6-55-4/b7 02000064->00000065 Xeon D-21xx
102+
CLX-SP B0 6-55-6/bf 0400002b->0400002c Xeon Scalable Gen2
103+
CLX-SP B1 6-55-7/bf 0500002b->0500002c Xeon Scalable Gen2
104+
SKL H/S/E3 R0/N0 6-5e-3/36 000000cc->000000d4 Core Gen6
105+
AML-Y22 H0 6-8e-9/10 000000b4->000000c6 Core Gen8 Mobile
106+
KBL-U/Y H0 6-8e-9/c0 000000b4->000000c6 Core Gen7 Mobile
107+
CFL-U43e D0 6-8e-a/c0 000000b4->000000c6 Core Gen8 Mobile
108+
WHL-U W0 6-8e-b/d0 000000b8->000000c6 Core Gen8 Mobile
109+
AML-Y V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
110+
CML-U42 V0 6-8e-c/94 000000b8->000000c6 Core Gen10 Mobile
111+
WHL-U V0 6-8e-c/94 000000b8->000000c6 Core Gen8 Mobile
112+
KBL-G/X H0 6-9e-9/2a 000000b4->000000c6 Core Gen7/Gen8
113+
KBL-H/S/E3 B0 6-9e-9/2a 000000b4->000000c6 Core Gen7; Xeon E3 v6
114+
CFL-H/S/E3 U0 6-9e-a/22 000000b4->000000c6 Core Gen8 Desktop, Mobile, Xeon E
115+
CFL-S B0 6-9e-b/02 000000b4->000000c6 Core Gen8
116+
CFL-H R0 6-9e-d/22 000000b8->000000c6 Core Gen9 Mobile

Diff for: security.md

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Security Policy
2+
3+
## Report a Vulnerability
4+
5+
If you have information about a security issue or vulnerability with an **Intel branded product or technology**, please send an e-mail to [[email protected]](mailto:[email protected]). Encrypt sensitive information using our [PGP public key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html).
6+
7+
Please provide as much information as possible, including:
8+
9+
- The products and versions affected
10+
- Detailed description of the vulnerability
11+
- Information on known exploits
12+
13+
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:
14+
15+
- [Vulnerability handling guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html)
16+
17+
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact [Intel's External Security Research team](mailto:[email protected]).
18+
19+
## Intel's Bug Bounty Program
20+
21+
Intel Corporation believes that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities in Intel products.
22+
23+
Like other major technology companies, Intel incentivizes security researchers to report security vulnerabilities in Intel products to us to enable a coordinated response. To encourage closer collaboration with the security research community on these kinds of issues, Intel created its Bug Bounty Program.
24+
25+
If you believe you've found a security vulnerability in an Intel product or technology, we encourage you to notify us through our program and work with us to mitigate and to coordinate disclosure of the vulnerability.
26+
27+
[Read full details.](https://www.intel.com/content/www/us/en/security-center/bug-bounty-program.html)
28+
29+
## Need product support?
30+
31+
The [[email protected]](mailto:[email protected]) e-mail address should only be used for reporting security issues.
32+
33+
If you...
34+
35+
- Have questions about the security features of an Intel product
36+
- Require technical support
37+
- Want product updates or patches
38+
39+
Please visit [Support & Downloads](https://www.intel.com/content/www/us/en/support.html).

0 commit comments

Comments
 (0)