[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted amd64-microcode 1.20120910-1~bpo60+1 (source i386 amd64)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 20 Sep 2012 18:10:16 -0300
Source: amd64-microcode
Binary: amd64-microcode
Architecture: amd64 i386 source
Version: 1.20120910-1~bpo60+1
Distribution: squeeze-backports
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Description: 
 amd64-microcode - Processor microcode firmware for AMD CPUs
Changes: 
 amd64-microcode (1.20120910-1~bpo60+1) squeeze-backports; urgency=low
 .
   * Backport to Squeeze: no changes required.
 .
 amd64-microcode (1.20120910-1) unstable; urgency=medium
 .
   * AMD microcode release 20120910
     + updated microcode:
       sig 0x00600F12, id 0x06000629: errata (+) 691, 709, 740;
     + new microcode:
       sig 0x00610F01, id 0x06001119: errata 671, 686, 697, 698, 699, 704, 709,
           734, 740;
     + This update adds critical errata fixes for commonly used features.
       The hit probability of these errata is unknown to the Debian maintainer.
   * README.Debian: mention module-init-tools, not just kmod.  This is useful
     when backporting to Debian Squeeze
   * debian/control: add Vcs-* fields
Checksums-Sha1: 
 747d4788a32ac7910f9646c50d2f765e418c239d 1655 amd64-microcode_1.20120910-1~bpo60+1.dsc
 03ee814bc894c7adc557e9b31c196c677ffb920c 24461 amd64-microcode_1.20120910.orig.tar.bz2
 1f47b0c838a73b14b14f531a6e0084cd7cfae5c4 9611 amd64-microcode_1.20120910-1~bpo60+1.debian.tar.gz
 c26630b4b1a0e3ee04131ee190ba59351778f9f9 27958 amd64-microcode_1.20120910-1~bpo60+1_amd64.deb
 dae4ceaf093bfc710d8d5f8ed3ce12ae6717e9d8 27962 amd64-microcode_1.20120910-1~bpo60+1_i386.deb
Checksums-Sha256: 
 70684b3650ffecca3cd9ab40813a9cca903b3bb75c915f86bc8805d21e1aff8c 1655 amd64-microcode_1.20120910-1~bpo60+1.dsc
 7a7df26865d1021ed72cfda327a4b2bf5a3d91f6fdc2abdcdb730416425c72d7 24461 amd64-microcode_1.20120910.orig.tar.bz2
 11ed74a10e7cd2216c0cce9e4cea7d7be830eda69716338e4b58ca577efc9c6b 9611 amd64-microcode_1.20120910-1~bpo60+1.debian.tar.gz
 d01257debeeb0ede929db301854a1b7dd4e2249dfeba11170789825f705efe71 27958 amd64-microcode_1.20120910-1~bpo60+1_amd64.deb
 cc814a9b062ebe2309cc655b2e09f2160ab4fe1c5ee7bc6dd101f6f23e6b4688 27962 amd64-microcode_1.20120910-1~bpo60+1_i386.deb
Files: 
 1f0da0c1720d37820fbf36ad5cc3f0b1 1655 non-free/admin standard amd64-microcode_1.20120910-1~bpo60+1.dsc
 c06c405981d3fbd93896305c06e49414 24461 non-free/admin standard amd64-microcode_1.20120910.orig.tar.bz2
 44ffff530356f1d86693a3b0559b0781 9611 non-free/admin standard amd64-microcode_1.20120910-1~bpo60+1.debian.tar.gz
 732848cf7ba0db1ceb8d513e1d465893 27958 non-free/admin standard amd64-microcode_1.20120910-1~bpo60+1_amd64.deb
 e9127e78c8e3af11794bdf333ee58331 27962 non-free/admin standard amd64-microcode_1.20120910-1~bpo60+1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCgAGBQJQW4n9AAoJEBZRjutISTEtI1MH/00svKMNI3B82kfXjrW2LspU
PBkgoC7Loog0KT6KUuOsaKmBMOxapckXuHkd6rrYueLDQmA+HN1SFAEIC0HliL1s
+0Jvi8hQQwxwUD8LLfyRClAfIlCX9jctuR+MKT1JNh1CawKP8sOkLzciwl1j/kR4
ja4Jcnff3I5Ke1DzxYAs/yP+ZsMTn5iO5DNFeesy/LbDL15AqNVsW8Ir6m/XaYUL
cGxHmnvpbARqBPgbabKYAOzxI1R0PvA0A0F3oOiNVPjrJrTnO2DE0NVhsd4SPQSi
GVw/zjFd0pogJ0cLae+umivt5WzNzxqDYLxM3XFMu+dI44VrFuge4ZtF5eA7/BI=
=kPqB
-----END PGP SIGNATURE-----


Accepted:
amd64-microcode_1.20120910-1~bpo60+1.debian.tar.gz
  to non-free/a/amd64-microcode/amd64-microcode_1.20120910-1~bpo60+1.debian.tar.gz
amd64-microcode_1.20120910-1~bpo60+1.dsc
  to non-free/a/amd64-microcode/amd64-microcode_1.20120910-1~bpo60+1.dsc
amd64-microcode_1.20120910-1~bpo60+1_amd64.deb
  to non-free/a/amd64-microcode/amd64-microcode_1.20120910-1~bpo60+1_amd64.deb
amd64-microcode_1.20120910-1~bpo60+1_i386.deb
  to non-free/a/amd64-microcode/amd64-microcode_1.20120910-1~bpo60+1_i386.deb
amd64-microcode_1.20120910.orig.tar.bz2
  to non-free/a/amd64-microcode/amd64-microcode_1.20120910.orig.tar.bz2


Reply to: