معرفی شرکت ها


firmware-intel-ucode-16-alt1.20210608.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Microcode definitions for Intel processors
ویژگی مقدار
سیستم عامل Linux
توزیع ALT p9
مخزن ALTLinux classic noarch
نام بسته firmware-intel-ucode
نام فایل بسته firmware-intel-ucode-16-alt1.20210608.noarch.rpm
نسخه بسته 16
انتشار بسته alt1.20210608
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed 27 Oct 2021 07
هاست سازنده cas-p9.hasher.altlinux.org
نوع بسته .rpm
آدرس صفحه اصلی https://salsa.debian.org/hmh/intel-microcode.git
مجوز INTEL SOFTWARE LICENSE AGREEMENT
حجم دانلود 3.8M
حجم نصب 4.712M
The microcode data file for Linux contains the latest microcode definitions for all Intel processors.


نیازمندی

مقدار نام
- rpmlib(PayloadIsLzma)


ارائه دهنده

مقدار نام
= 16-alt1.20210608 microcode-data-intel
= 2:16-alt1.20210608:p9+288217.100.1.1 firmware-intel-ucode


نحوه نصب


نصب پکیج rpm firmware-intel-ucode:

    sudo apt-get install firmware-intel-ucode-16-alt1.20210608.noarch.rpm


فایل ها

مسیرها
/lib/firmware/intel-ucode
/lib/firmware/intel-ucode/intel-microcode.bin
/usr/share/doc/firmware-intel-ucode-16
/usr/share/doc/firmware-intel-ucode-16/changelog
/usr/share/doc/firmware-intel-ucode-16/license
/usr/share/doc/firmware-intel-ucode-16/releasenote.md
/usr/share/doc/firmware-intel-ucode-16/security.md


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2021-06-14

Sync with Debian 3.20210608.1:
2020-24511 CVE-2020-24512
SA-00464), information leakage through shared resources,
2020-24513 (INTEL-SA-00465),
bypass transient execution vulnerability in some Intel Atom
2021-24489 (INTEL-SA-00442), Intel
d privilege escalation
11-16, rev 0x3000010, size 47104
03-08, rev 0xc0002f0, size 283648
04-25, rev 0xd0002a0, size 283648
02-17, rev 0xb00000f, size 130048
02-17, rev 0xb00000f, size 130048
03-31, rev 0x0088, size 109568
04-07, rev 0x0016, size 94208
04-23, rev 0x002c, size 99328
02-04, rev 0x0011, size 19456
03-23, rev 0x001d, size 19456
04-11, rev 0x0040, size 100352
01-27, rev 0x0046, size 34816
02-05, rev 0x0019, size 19456
01-25, rev 0x00ea, size 105472
02-06, rev 0xb00003e, size 31744
03-08, rev 0x100015b, size 34816
03-08, rev 0x2006b06, size 36864
03-08, rev 0x4003102, size 30720
03-08, rev 0x5003102, size 30720
04-23, rev 0x7002302, size 27648
02-04, rev 0x700001b, size 24576
02-04, rev 0xf000019, size 24576
02-04, rev 0xe000012, size 19456
10-23, rev 0x0044, size 17408
10-23, rev 0x0020, size 15360
01-25, rev 0x00ea, size 105472
10-23, rev 0x0034, size 11264
10-23, rev 0x0036, size 74752
10-23, rev 0x001a, size 75776
11-01, rev 0x00a6, size 110592
11-06, rev 0x002a, size 32768
01-05, rev 0x00ea, size 104448
01-05, rev 0x00ea, size 104448
01-06, rev 0x00ea, size 103424
01-05, rev 0x00ea, size 104448
01-05, rev 0x00ea, size 104448
01-05, rev 0x00ea, size 104448
01-05, rev 0x00ea, size 102400
01-05, rev 0x00ea, size 104448
01-05, rev 0x00ea, size 103424
01-05, rev 0x00ea, size 103424
02-07, rev 0x00ea, size 93184
03-08, rev 0x00ea, size 94208
03-08, rev 0x00ec, size 94208
12-08, rev 0x00e8, size 94208
02-07, rev 0x00ea, size 93184

2021-06-03

Sync with Debian 3.20210216.1:
D 21xx,
SA-00381 mitigation.
12-31, rev 0x2006a0a, size 36864
12-31, rev 0x4003006, size 53248
12-31, rev 0x5003006, size 53248

2020-11-17

Sync with Debian 3.20201110.1:
2020-8696 and CVE-2020-8698,
SA-00381: AVX register information leakage;
Forward store predictor information leakage
2020-8695, Intel SGX information
SA-00389
2020-0543, INTEL-SA-00320)
U/Y, Skylake Xeon E3
08-20, rev 0x700001e, size 27648
06-26, rev 0x0028, size 32768
10-02, rev 0x0068, size 107520
07-08, rev 0x00e0, size 93184
07-08, rev 0x00e0, size 94208
07-08, rev 0x00e0, size 93184
07-02, rev 0x00e0, size 93184
05-27, rev 0x0044, size 34816
07-14, rev 0x00e2, size 105472
06-18, rev 0x1000159, size 33792
06-16, rev 0x2006a08, size 35840
06-18, rev 0x4003003, size 52224
06-18, rev 0x5003003, size 52224
02-27, rev 0x0040, size 17408
02-27, rev 0x001e, size 15360
07-14, rev 0x00e2, size 105472
06-09, rev 0x0018, size 75776
07-30, rev 0x00a0, size 109568
05-27, rev 0x00de, size 104448
05-27, rev 0x00de, size 104448
06-17, rev 0x00e0, size 104448
06-03, rev 0x00de, size 104448
05-18, rev 0x00de, size 104448
05-26, rev 0x00de, size 104448
05-25, rev 0x00de, size 103424
05-25, rev 0x00de, size 104448
06-03, rev 0x00de, size 103424
05-24, rev 0x00de, size 103424
07-08, rev 0x00e0, size 94208
Linux-Processor-Microcode-Data-Files/issues/44
SA-00381 AND INTEL-SA-00389 MITIGATIONS ARE THEREFORE NOT INSTALLED

2020-07-13

Sync with Debian 3.20200616.1:
10-03, rev 0x00d6, size 101376
10-03, rev 0x00d6, size 101376
U/Y and Skylake Xeon E3,
Linux-Processor-Microcode-Data-Files/issues/31
REGRESSION FIX: 0x406e3: rollback to rev 0xd6 and document regression
Security fixes:
2020-0543 Special Register Buffer Data
SA-00320
2020-0548 Vector Register Data Sampling
SA-00329
2020-0549 L1D Cache Eviction Sampling
SA-00329
11-12 (sig
11-12, rev 0x0028, size 23552
11-12, rev 0x002f, size 19456
11-12, rev 0x0026, size 22528
11-12, rev 0x001c, size 25600
11-12, rev 0x0022, size 14336
04-27, rev 0x00dc, size 104448
04-24, rev 0x1000157, size 32768
04-24, rev 0x2006906, size 34816
04-23, rev 0x4002f01, size 52224
04-23, rev 0x5002f01, size 52224
04-27, rev 0x00d6, size 103424
04-27, rev 0x00d6, size 103424
04-27, rev 0x00d6, size 103424
04-27, rev 0x00d6, size 103424
04-23, rev 0x00d6, size 103424
04-23, rev 0x00d6, size 103424
04-27, rev 0x00d6, size 102400
04-23, rev 0x00d6, size 103424
04-27, rev 0x00d6, size 102400
04-23, rev 0x00d6, size 103424

2020-01-20

Sync with Debian 3.20191115.2:
07-31, rev 0x2000064, size 33792
Linux-Processor-Microcode-Data-Files/issues/21
10-03, rev 0x00d6, size 101376
10-03, rev 0x00d6, size 101376
10-15, rev 0x00ca, size 100352
09-26, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 99328
10-03, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 99328
10-03, rev 0x00ca, size 100352
10-03, rev 0x00ca, size 91136

2019-10-07

Sync with Debian 3.20190918.1:
06-13, rev 0x002e, size 19456
06-17, rev 0x0016, size 18432
06-13, rev 0x0021, size 14336
06-18, rev 0xb000038, size 30720
07-31, rev 0x2000064, size 33792
08-12, rev 0x500002b, size 51200
06-17, rev 0x001c, size 32768
06-17, rev 0x7000019, size 24576
06-17, rev 0xf000017, size 24576
06-17, rev 0xe00000f, size 19456

2019-09-09

Sync with Debian 3.20190618.1:
SA-00223
2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
X processors
05-21, rev 0x061f, size 18432
05-21, rev 0x0718, size 19456

2019-05-20

Sync with Debian 3.20190514.1:
SA-00223
2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
04-22, rev 0x0838, size 52224
04-22, rev 0x0838, size 52224
04-23, rev 0x090c, size 52224
04-23, rev 0x0368, size 69632
04-23, rev 0x0411, size 68608
02-27, rev 0x5000021, size 47104
02-17, rev 0x002f, size 12288
02-13, rev 0x0021, size 14336
02-26, rev 0x0027, size 23552
03-07, rev 0x002d, size 19456
03-14, rev 0x042e, size 16384
03-14, rev 0x0715, size 17408
03-01, rev 0x0043, size 34816
03-01, rev 0x0014, size 18432
02-26, rev 0x0025, size 21504
02-26, rev 0x001b, size 25600
03-07, rev 0x0020, size 14336
04-01, rev 0x00cc, size 100352
03-02, rev 0xb000036, size 30720
04-02, rev 0x200005e, size 32768
03-23, rev 0x001a, size 32768
03-23, rev 0x7000017, size 24576
03-23, rev 0xf000015, size 23552
03-23, rev 0xe00000d, size 19456
01-15, rev 0x0038, size 17408
03-01, rev 0x0016, size 15360
04-01, rev 0x00cc, size 100352
03-21, rev 0x002e, size 11264
01-02, rev 0x002e, size 73728
04-01, rev 0x00b4, size 98304
04-01, rev 0x00b4, size 99328
04-01, rev 0x00b4, size 99328
03-30, rev 0x00b8, size 98304
03-30, rev 0x00b8, size 97280
04-01, rev 0x00b4, size 99328
04-01, rev 0x00b4, size 98304
04-01, rev 0x00b4, size 99328
02-14, rev 0x00ae, size 98304
03-17, rev 0x00b8, size 97280

2019-04-11

Sync with Debian 3.20190312.1:
01-29, rev 0x1000140, size 30720
10-18, rev 0x009e, size 98304
10-25, rev 0x00a4, size 99328
02-12, rev 0x00b2, size 98304
09-29, rev 0x00a2, size 98304
02-04, rev 0x00b0, size 97280
11-20, rev 0x0041, size 34816
11-06, rev 0x0013, size 17408
01-28, rev 0x200005a, size 33792
12-06, rev 0x0019, size 32768
12-06, rev 0x7000016, size 23552
11-17, rev 0xf000014, size 23552
11-17, rev 0xe00000c, size 19456
09-14, rev 0x0036, size 17408
09-20, rev 0x0010, size 15360
09-21, rev 0x002c, size 73728
07-16, rev 0x009a, size 98304
10-18, rev 0x009e, size 98304
07-16, rev 0x009a, size 98304
12-12, rev 0x00aa, size 98304
12-12, rev 0x00aa, size 99328

2018-08-30

Update url.

2018-08-30

Sync with Debian 3.20180807a1:
05-08, rev 0x001f, size 11264
05-15, rev 0x000d, size 9216
05-11, rev 0x0014, size 15360
05-11, rev 0x000c, size 14336
05-11, rev 0x0024, size 10240
05-11, rev 0x001d, size 12288
05-08, rev 0x000a, size 9216
05-08, rev 0x0011, size 9216
04-23, rev 0x0007, size 4096
04-10, rev 0x002e, size 12288
05-16, rev 0x003b, size 14336
04-10, rev 0x0020, size 13312
04-02, rev 0x0025, size 23552
03-22, rev 0x002b, size 18432
04-02, rev 0x0024, size 22528
04-02, rev 0x001a, size 25600
04-03, rev 0x001e, size 13312
04-17, rev 0x00c6, size 99328
05-25, rev 0x0017, size 31744
04-20, rev 0x7000013, size 22528
04-20, rev 0xf000012, size 22528
05-11, rev 0x0032, size 16384
04-17, rev 0x00c6, size 99328
05-22, rev 0x0028, size 73728
03-24, rev 0x008e, size 98304
05-15, rev 0x0096, size 98304
03-24, rev 0x008e, size 98304
05-02, rev 0x0096, size 97280
03-24, rev 0x008e, size 98304
NG" mitigation)
00161, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646
00115, CVE-2018-3639, CVE-2018-3640
0088, CVE-2017-5753, CVE-2017-5754
source: update symlinks to reflect id of the latest release, 20180807a

2018-08-06

Sync with Debian 3.20180703.2:
05-08, rev 0x061d, size 18432
05-08, rev 0x0714, size 19456
04-25, rev 0x042d, size 15360
04-25, rev 0x0714, size 17408
04-20, rev 0x003d, size 33792
04-20, rev 0x0012, size 17408
04-19, rev 0xb00002e, size 28672
05-15, rev 0x200004d, size 31744
04-20, rev 0xe00000a, size 18432
00115, CVE-2018-3639, CVE-2018-3640
v4 mitigation) and fix Spectre-v3a for:
source: update symlinks to reflect id of the latest release, 20180703

2018-06-18

Make package %ix86/x86_64 only.

2018-06-18

Update 20180425 (debian changelog below):
03-21, rev 0xb00002c, size 27648
12-26, rev 0x0022, size 73728
v2 mitigation
source: remove undesired list files from microcode directories
source: switch to microcode-<id>.d/ since Intel dropped .dat

2018-03-20

Update to 20180312.
01-29, rev 0x1000140, size 30720
01-22, rev 0xe000009, size 18432
02-07, rev 0x002d, size 12288
01-30, rev 0x061c, size 18432
01-26, rev 0x0713, size 19456
02-07, rev 0x001f, size 13312
01-21, rev 0x0024, size 23552
01-18, rev 0x002a, size 18432
01-25, rev 0x042c, size 15360
02-16, rev 0x0713, size 16384
01-19, rev 0x003c, size 33792
01-22, rev 0x0011, size 17408
01-18, rev 0x0023, size 21504
01-21, rev 0x0019, size 25600
01-21, rev 0x001d, size 12288
11-16, rev 0x00c2, size 99328
01-26, rev 0x2000043, size 28672
01-22, rev 0x0015, size 31744
01-22, rev 0x7000012, size 22528
01-22, rev 0xf000011, size 22528
03-25, rev 0x002c, size 16384
11-16, rev 0x00c2, size 99328
10-31, rev 0x001e, size 72704
01-21, rev 0x0084, size 98304
01-21, rev 0x0084, size 97280
01-21, rev 0x0084, size 98304
01-21, rev 0x0084, size 96256
01-21, rev 0x0084, size 98304

2018-02-08

Rollback microcode files back to 20171117 (debian changelog below):
01-22 (closes: #886998)