]> git.ipfire.org Git - thirdparty/linux-firmware.git/commitdiff
linux-firmware: Update AMD cpu microcode
authorJohn Allen <john.allen@amd.com>
Mon, 27 Oct 2025 22:25:01 +0000 (17:25 -0500)
committerJohn Allen <john.allen@amd.com>
Mon, 27 Oct 2025 22:35:36 +0000 (17:35 -0500)
* Update AMD cpu microcode for processor family 19h

Key Name        = AMD Microcode Signing Key (for signing microcode container files only)
Key ID          = F328AE73
Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73

Signed-off-by: John Allen <john.allen@amd.com>
amd-ucode/README
amd-ucode/microcode_amd_fam19h.bin
amd-ucode/microcode_amd_fam19h.bin.asc

index 0f6d6f9f5811fe15c2b8529b6557bb93a483f42f..62069ea459e6fae414ebfeb1a7345821758ec056 100644 (file)
@@ -41,13 +41,17 @@ Microcode patches in microcode_amd_fam17h.bin:
 
 Microcode patches in microcode_amd_fam19h.bin:
   Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a00107a Length=5568 bytes
+  Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 Length=5568 bytes
   Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011de Length=5568 bytes
     Minimum base ucode version for loading: 0x0a0011d9
+  Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 Length=5568 bytes
   Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001247 Length=5568 bytes
     Minimum base ucode version for loading: 0x0a001242
   Family=0x19 Model=0x08 Stepping=0x02: Patch=0x0a00820d Length=5568 bytes
+  Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 Length=5568 bytes
   Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101158 Length=5568 bytes
     Minimum base ucode version for loading: 0x0a101153
+  Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 Length=5568 bytes
   Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101253 Length=5568 bytes
     Minimum base ucode version for loading: 0x0a10124e
   Family=0x19 Model=0x18 Stepping=0x01: Patch=0x0a108109 Length=5568 bytes
@@ -61,6 +65,7 @@ Microcode patches in microcode_amd_fam19h.bin:
   Family=0x19 Model=0x78 Stepping=0x00: Patch=0x0a708008 Length=5568 bytes
   Family=0x19 Model=0x7c Stepping=0x00: Patch=0x0a70c008 Length=5568 bytes
   Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116 Length=5568 bytes
+  Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 Length=5568 bytes
   Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa0021c Length=5568 bytes
     Minimum base ucode version for loading: 0x0aa00218
 
@@ -87,3 +92,20 @@ the required minimum patch levels to address this problem:
   Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e
   Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116
   Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212
+
+NOTE: In order to not fully abandon machines affected by AMD-SB-7033 [1] that
+have not received the BIOS update, the family 19h microcode container now
+includes a second patch for these machines that brings the microcode to the
+highest possible level without the microcode signing fix. While a BIOS update
+is highly recommended to receive the latest security updates issued after the
+microcode signing vulnerability, this will allow non-updated systems to at
+least receive some microcode updates beyond the version provided by BIOS.
+
+The list of additional patches can be seen below:
+  Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d5 Length=5568 bytes
+  Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001238 Length=5568 bytes
+  Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101148 Length=5568 bytes
+  Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101248 Length=5568 bytes
+  Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00215 Length=5568 bytes
+
+[1]: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html
index 6d246d0c2efd78e68392b4e388b10f72d8ef9cf3..41154d62f8a6fed0cc62e43a6d0ecf9c4c5e2fb6 100644 (file)
Binary files a/amd-ucode/microcode_amd_fam19h.bin and b/amd-ucode/microcode_amd_fam19h.bin differ
index 861cf15e5415616c059adc0cc46dbdffd0463868..2ce88663b9f57bdf6e8f0432ec7d4f2fad5c2bf0 100644 (file)
@@ -1,11 +1,11 @@
 -----BEGIN PGP SIGNATURE-----
 
-iQEzBAABCgAdFiEE/HxsUF2vzBRxg1fK5L5TOfMornMFAmiD3eIACgkQ5L5TOfMo
-rnOkvwgAhggO6cpopMTqXyyxVel1fJNfH49ZRUUVWHWBXSMR0fP7/cfbS/YwalJw
-IWrB78zIChNJWqhb3KcIucaqVrg79K396bRBVXGNXMwdpczhqGTBW/71NE1YU1lf
-0jpTXsZc8V1HgrFKKL+5LBZ2qzgAv+PeLIBPidEWTRTAgeVqFsBU6QuF3vRjiCAM
-ONtWCLa7VdCo5/EvbSEKUr6a6fOxMXzpuZTFj6wGU/zrci22M3REKG+wPjG5Ho2+
-GeIF//kQMMhcorLA0xPCUEHuctPB+UO5dgRBWK9T6RXAEqfZl+cIX3q8ScAPf+/W
-Lmie8Vr5Zoy/lWMuW46WNFFn9bqllw==
-=q09m
+iQEzBAABCgAdFiEE/HxsUF2vzBRxg1fK5L5TOfMornMFAmj4/hcACgkQ5L5TOfMo
+rnN+pAgAqw2g0/vMt82S58O5q2Ec35xqEBabSaeQkI9T2tolQmlBx45ggT8eWitf
+Wx4Oopq13lLvHNk7d7Isvi0nZ/+4yu7IoBNPqR1jkbgUOW1qmhkGK3PJROUphPGZ
+r6GPd/sRW/ugDECO7fiheqop9OzGlOwMzovSJNUDvQL8MfRK9bKUNSPmmKYLeKzw
+5cWtKKhC3AMxaCGiL4gJIXrT+SG+VxR3rMOiFLu2vYi5wJvYbutXX4GspjXPg9PV
+HjE1cQt8pgGEVmGDD47yLNttAN1OVTxf4tBcJmc9svxmFrI6f3TKU99h+fzmH/Zj
+1MGoWAW4FP8L4AEqjJkiUjof08hiVw==
+=IB2l
 -----END PGP SIGNATURE-----