[ubuntu/eoan-proposed] intel-microcode 3.20190918.1ubuntu1 (Accepted)

Steve Beattie sbeattie at ubuntu.com
Tue Oct 1 19:47:07 UTC 2019


intel-microcode (3.20190918.1ubuntu1) eoan; urgency=low

  * Merge from Debian testing.  Remaining changes:
    - debian/initramfs.hook: Do not override preset defaults from
      auto-exported conf snippets loaded by initramfs-tools.

intel-microcode (3.20190918.1) unstable; urgency=medium

  * New upstream microcode datafile 20190918
    + SECURITY UPDATE
      *Might* contain mitigations for INTEL-SA-00247 (RAMBleed), given
      the set of processors being updated.
    + Updated Microcodes:
      sig 0x000306d4, pf_mask 0xc0, 2019-06-13, rev 0x002e, size 19456
      sig 0x000306f4, pf_mask 0x80, 2019-06-17, rev 0x0016, size 18432
      sig 0x00040671, pf_mask 0x22, 2019-06-13, rev 0x0021, size 14336
      sig 0x000406f1, pf_mask 0xef, 2019-06-18, rev 0xb000038, size 30720
      sig 0x00050654, pf_mask 0xb7, 2019-07-31, rev 0x2000064, size 33792
      sig 0x00050657, pf_mask 0xbf, 2019-08-12, rev 0x500002b, size 51200
      sig 0x00050662, pf_mask 0x10, 2019-06-17, rev 0x001c, size 32768
      sig 0x00050663, pf_mask 0x10, 2019-06-17, rev 0x7000019, size 24576
      sig 0x00050664, pf_mask 0x10, 2019-06-17, rev 0xf000017, size 24576
      sig 0x00050665, pf_mask 0x10, 2019-06-17, rev 0xe00000f, size 19456

intel-microcode (3.20190618.1) unstable; urgency=medium

  * New upstream microcode datafile 20190618
    + SECURITY UPDATE
      Implements MDS mitigation (RIDL, Fallout, Zombieload), INTEL-SA-00223
      CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
      for Sandybridge server and Core-X processors
    + Updated Microcodes:
      sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
      sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
  * Add some missing (minor) changelog entries to 3.20190514.1
  * Reformat 3.20190514.1 changelog entry to match rest of changelog

Date: Mon, 30 Sep 2019 11:37:19 -0700
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20190918.1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Mon, 30 Sep 2019 11:37:19 -0700
Source: intel-microcode
Architecture: source
Version: 3.20190918.1ubuntu1
Distribution: eoan
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Beattie <sbeattie at ubuntu.com>
Changes:
 intel-microcode (3.20190918.1ubuntu1) eoan; urgency=low
 .
   * Merge from Debian testing.  Remaining changes:
     - debian/initramfs.hook: Do not override preset defaults from
       auto-exported conf snippets loaded by initramfs-tools.
 .
 intel-microcode (3.20190918.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20190918
     + SECURITY UPDATE
       *Might* contain mitigations for INTEL-SA-00247 (RAMBleed), given
       the set of processors being updated.
     + Updated Microcodes:
       sig 0x000306d4, pf_mask 0xc0, 2019-06-13, rev 0x002e, size 19456
       sig 0x000306f4, pf_mask 0x80, 2019-06-17, rev 0x0016, size 18432
       sig 0x00040671, pf_mask 0x22, 2019-06-13, rev 0x0021, size 14336
       sig 0x000406f1, pf_mask 0xef, 2019-06-18, rev 0xb000038, size 30720
       sig 0x00050654, pf_mask 0xb7, 2019-07-31, rev 0x2000064, size 33792
       sig 0x00050657, pf_mask 0xbf, 2019-08-12, rev 0x500002b, size 51200
       sig 0x00050662, pf_mask 0x10, 2019-06-17, rev 0x001c, size 32768
       sig 0x00050663, pf_mask 0x10, 2019-06-17, rev 0x7000019, size 24576
       sig 0x00050664, pf_mask 0x10, 2019-06-17, rev 0xf000017, size 24576
       sig 0x00050665, pf_mask 0x10, 2019-06-17, rev 0xe00000f, size 19456
 .
 intel-microcode (3.20190618.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20190618
     + SECURITY UPDATE
       Implements MDS mitigation (RIDL, Fallout, Zombieload), INTEL-SA-00223
       CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
       for Sandybridge server and Core-X processors
     + Updated Microcodes:
       sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
       sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
   * Add some missing (minor) changelog entries to 3.20190514.1
   * Reformat 3.20190514.1 changelog entry to match rest of changelog
Checksums-Sha1:
 2525af289000cc62a37eccb9ae77180062572170 1896 intel-microcode_3.20190918.1ubuntu1.dsc
 cfb2a244538a203de3d865fd53ea5b1338690170 2611788 intel-microcode_3.20190918.1ubuntu1.tar.xz
 5d2469640710cf10ca74bfcfef6f3d79bf845849 5671 intel-microcode_3.20190918.1ubuntu1_source.buildinfo
Checksums-Sha256:
 103b53a5849b5056d0995a10a6212b23fd2e7a6781d2b9b1b0f0f377f2ac56a5 1896 intel-microcode_3.20190918.1ubuntu1.dsc
 294c747a56dccc1ba0e3ef0b97ee3e268af0bc73f96a54ecf96211c6587c857b 2611788 intel-microcode_3.20190918.1ubuntu1.tar.xz
 2eb87123c2396d9a7b608c32cfe79c2a83a1066135e4448a7467e7123143ae42 5671 intel-microcode_3.20190918.1ubuntu1_source.buildinfo
Files:
 4d53ebf8e9f38f8ac8f473af3df8f14a 1896 non-free/admin standard intel-microcode_3.20190918.1ubuntu1.dsc
 e27c6e12ad53cf36f8cfc6bcf6694ecd 2611788 non-free/admin standard intel-microcode_3.20190918.1ubuntu1.tar.xz
 c708ee2ba8c2a0c717385ef17fb2a4da 5671 non-free/admin standard intel-microcode_3.20190918.1ubuntu1_source.buildinfo
Original-Maintainer: Henrique de Moraes Holschuh <hmh at debian.org>


More information about the Eoan-changes mailing list