Already part of the upcoming DB/repo update! Thanks for the update regardless!
cpu506C9_plat03_ver00000048_2021-11-16_PRD_C82C5521
cpu506F1_plat01_ver00000038_2021-12-02_PRD_456E8617
cpu606A6_plat87_ver0D000363_2022-03-30_PRD_C92D5693
cpu706E5_plat80_ver000000B0_2022-03-09_PRD_F1D9ED3E
cpu806A1_plat10_ver00000031_2022-03-26_PRD_4F103D2F
cpu906C0_plat01_ver24000023_2022-02-19_PRD_844B42C6
cpuA0671_plat02_ver00000053_2022-03-09_PRD_E5A2B10D
Windows Server Insider Preview Build 25110. No client today.
intel_220504.rar (582.6 KB)
This one is a bit interesting. A field at the âExtraâ header is no longer reserved. Its value of â1â does not help to understand its purpose, but Iâll update MCE to show it either way.
Nothing new in Windows 11 Insider Preview Build 22616.
!New_cpu906A3_plat80_ver0000041C_2022-03-24_PRD_423EE5AC.bin
!New_cpu906A4_plat80_ver0000041C_2022-03-24_PRD_423EE5AB.bin
!New_cpu5065B_platBF_ver07002501_2021-11-19_PRD_077FCFEE.bin
!New_cpu50653_plat97_ver0100015D_2021-11-13_PRD_DF5F0002.bin
Intel.zip (479.9 KB)
AMD cpu00A40F41_ver0A404102_2021-10-18_78BCFB87
Nothing new in Windows 11 Insider Preview Build 22621 & 25115.
Nothing new in Windows 11 & Server Insider Preview Build 25120.
Nothing new in Windows 11 Insider Preview Build 25126.
Intel cpu906A4_plat80_ver0000041E_2022-05-16_PRD_1C11EA81
Intel cpu906A3_plat80_ver0000041E_2022-05-16_PRD_1C11EA82
Intel cpuB0671_plat32_ver00000104_2022-04-19_PRD_A0E54C6F
Intel cpuB0670_plat02_ver0000000E_2022-02-20_PRD_0A83935A
uCodes.rar (596.9 KB)
Nothing new in Windows 11 Insider Preview Build 25131, but I donât understand why we even post this week after week. You have to write when something new appears, right?
@westlake I do appreciate the updates, it saves me loading mcupdate_GenuineIntel.dll into MCExtractor to see if anything has changed on each insider build (and mcupdate_AuthenticAMD.dll for the AMD folks).
On a side note, I do find it amusing that a microcode for CPUID 906ED for my 9900KS and 9700K is not even present in Windows 10 21H2 mcupdate_GenuineIntel.dll.
@westlake I agree with @chinobino on this. I also find it useful to know that at least someone did check the latest dll from the various MS builds for anything new. Thank you all for keeping us in the loop.
Perhaps my wording is imprecise? My point was that it is pointless to write week after week that there is nothing new in a given build. I did not mean that there is no point in regularly checking the two files. It is enough to write if there IS something new in them. I always check it, so you donât have to wonder if no one posted it because no one checked it.
No, that doesnât mean that your wording is imprecise, thatâs a matter of communication:
Posting ânothing newâ means in addition âI did checkâ
Posting nothing leaves it open if you checked of maybe forgot it or just decided no longer to check at all or maybe MS is late with its build?
Iâm not on any insider program but I appreciate it to know that someone did check and thereâs nothing newâŚ
I personally like the ânothing newâ updates for MS dlls, still useful. There is no problem at all to post these whenever you check a new build. But itâs your choice of course.
I like it when someone post nothing new, cause MS will add new MC and then remove them the next build, so every new build should be checked!
Intel released new security advisories: INTEL-SA-00615 and INTEL-SA-00645 and INTEL-SA-00698
And they even update the 2022 table Affected Processors: Transient Execution Attacks & Related Security...
Apparently he new F0 is just a security patch for MMIO CVE Processor MMIO Stale Data Vulnerabilities, EVEN MS release a new speculation control with more info PowerShell Gallery | SpeculationControl 1.0.15 with 2022 CVE
More info can be found here Security Update Guide - Microsoft Security Response Center
For more information about the output below, please refer to https://support.microsoft.com/help/4074629
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: True [not required for security]
Speculation control settings for CVE-2018-3639 [speculative store bypass]
Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: True
Speculation control settings for CVE-2018-3620 [L1 terminal fault]
Hardware is vulnerable to L1 terminal fault: True
Windows OS support for L1 terminal fault mitigation is present: True
Windows OS support for L1 terminal fault mitigation is enabled: True
Speculation control settings for MDS [microarchitectural data sampling]
Windows OS support for MDS mitigation is present: True
Hardware is vulnerable to MDS: True
Windows OS support for MDS mitigation is enabled: True
Speculation control settings for SPDR [shared buffers data read]
Windows OS support for SPDR mitigation is present: True
Hardware is vulnerable to SBDR: True
Windows OS support for SPDR mitigation is enabled: True
Speculation control settings for FBSDP [fill buffer stale data propagator]
Windows OS support for FBSDP mitigation is present: True
Hardware is vulnerable to FBSDP: True
Windows OS support for FBSDP mitigation is enabled: True
Speculation control settings for PSDP [primary stale data propagator]
Windows OS support for PSDP mitigation is present: True
Hardware is vulnerable to PSDP: True
Windows OS support for PSDP mitigation is enabled: True
BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled : False
BTIKernelImportOptimizationEnabled : True
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled : True
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : True
SSBDWindowsSupportEnabledSystemWide : True
L1TFHardwareVulnerable : True
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : True
L1TFInvalidPteBit : 45
L1DFlushSupported : True
MDSWindowsSupportPresent : True
MDSHardwareVulnerable : True
MDSWindowsSupportEnabled : True
FBClearWindowsSupportPresent : True
SBDRSSDPHardwareVulnerable : True
FBSDPHardwareVulnerable : True
PSDPHardwareVulnerable : True
FBClearWindowsSupportEnabled : True
I hope it will be appropriate instead of ânothing newâ. I will try to keep updating. It seems complicated at first, but itâs not really. If anyone has any questions, please ask privately.
Intel cpuB0671_plat32_ver00000105_2022-06-01_PRD_6F68F320
cpuB0671_plat32_ver00000105_2022-06-01_PRD_6F68F320.rar (194.5 KB)
Any news on what has been changed in the latest microcode for rocket-lake,
Intel cpuA0671_plat02_ver00000054_2022-03-17_PRD_CE482700 ?