[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted amd64-microcode 2.20141028.1~bpo70+1 (amd64 i386 source) into wheezy-backports->backports-policy, wheezy-backports



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 19 Dec 2014 15:08:36 -0200
Source: amd64-microcode
Binary: amd64-microcode
Architecture: amd64 i386 source
Version: 2.20141028.1~bpo70+1
Distribution: wheezy-backports
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 723081 723975 726854 753593
Description: 
 amd64-microcode - Processor microcode firmware for AMD CPUs
Changes: 
 amd64-microcode (2.20141028.1~bpo70+1) wheezy-backports; urgency=medium
 .
   * Rebuild for wheezy-backports (no changes)
 .
 amd64-microcode (2.20141028.1) unstable; urgency=medium
 .
   * Upstream release 20141028 built from linux-firmware:
     + Updated microcode patches for family 0x15 processors
     + Added microcode patches for family 0x16 processors
   * AMD did not update the relevant microcode documentation (errata fixed,
     microcode patch levels, etc), so there is no documentation for the
     family 0x16 microcode patches, and the documentation for family 0x15 is
     stale.
   * postinst: do not update microcode on upgrades:
     Remove code that triggers a microcode update on package upgrade.  The
     resulting postinst script is now identical to the one in Debian jessie's
     intel-microcode, and thus known-good.
     NOTE: this code was already disabled for the majority of the users due
     to Debian bug #723975 (closes: #723975, #723081)
   * kpreinst: remove, we don't update microcode on postinst anymore
   * blacklist automated loading of the microcode module:
     This is in line with the desired behavior of only updating microcode
     *automatically* during system boot, when it is safer to do so.  The
     local admin can still load the microcode module and update the microcode
     manually at any time, of course.  This is in sync with the intel-microcode
     packages in Debian jessie, which will also blacklist the microcode module.
     Note that the initramfs will force-load the microcode module in a safe
     condition, the blacklist avoids module autoloading outside the initramfs
   * control: bump standards version (no changes required)
   * copyright: update upstream URL and upstream copyright date
     (closes: #753593)
   * docs: future-proof by using a glob pattern for per-family README files
   * initramfs hook: support forced installation of amd64-microcode:
     Add a config file (/etc/default/amd64-microcode) to select the mode of
     operation: do nothing, force install to initramfs, install only when
     running on an amd64 processor (closes: #726854)
   * initramfs hook: fix (likely unexploitable) issues found by shellcheck
   * Add a NEWS.Debian file to warn users we will no longer update the
     microcode on package upgrade (note that we were not doing it on any
     Debian kernels anyway).  Also document the existence of the new
     /etc/default/amd64-microcode file
 .
 amd64-microcode (2.20131007.1+really20130710.1) unstable; urgency=low
 .
   * Fix M-D-Y issue that leaked to the package version number
   * The real upstream release date is 2013-07-10
 .
 amd64-microcode (2.20131007.1) unstable; urgency=low
 .
   * New upstream release, received through linux-firmware and LKML
     + updated microcode:
       sig 0x00500F10, id 0x05000029: erratum (+) 784;
       sig 0x00500F20, id 0x05000119: erratum (+) 784;
       sig 0x00600F12, id 0x0600063D: errata (-) 668, (+) 759, 778;
     + new microcode:
       sig 0x00200F31, id 0x02000032: errata 311, 316;
       sig 0x00600F20, id 0x06000822: errata 691, 699, 704, 708, 709, 734,
           740, 778;
     + This update fixes important processor bugs that cause data corruption
       or unpredictable system behaviour.  It also fixes a performance issue
       and several issues that cause system lockup.
   * Switch to native package, since there is no upstream tarball
Checksums-Sha1: 
 d32192c2815cba0566198a7c8ae4dfbbf2dd1444 1710 amd64-microcode_2.20141028.1~bpo70+1.dsc
 91d93af2919108dbf2b4d0d0ee38a378f227b881 32420 amd64-microcode_2.20141028.1~bpo70+1.tar.gz
 b7c837074b84b4d8709ad44685d75c7636c4968d 30750 amd64-microcode_2.20141028.1~bpo70+1_amd64.deb
 35089b54c34ab76ebe74d7ed87c06f8d50d2932c 30750 amd64-microcode_2.20141028.1~bpo70+1_i386.deb
Checksums-Sha256: 
 e5c819654c440b8ef22a8c7e28752d644d02abb68afd316e6b0d6ebeed590b37 1710 amd64-microcode_2.20141028.1~bpo70+1.dsc
 ecfafd8df8ce8c969e29d3fe42e8c52d0ebf9c2233ae6d4993bd268e78f03792 32420 amd64-microcode_2.20141028.1~bpo70+1.tar.gz
 7df0bec58e915a7122929f1b7323e0a9996e9b9970f95029e7cc6281615574d7 30750 amd64-microcode_2.20141028.1~bpo70+1_amd64.deb
 cb5d6c6047be284f42e61f24def2ee969f1c32849b7670cd0b79e14880fb01b7 30750 amd64-microcode_2.20141028.1~bpo70+1_i386.deb
Files: 
 30aff2bc4e680b056e45ce002196fed1 1710 non-free/admin standard amd64-microcode_2.20141028.1~bpo70+1.dsc
 234e1fc482e6c4d9f10a1f08058cf8be 32420 non-free/admin standard amd64-microcode_2.20141028.1~bpo70+1.tar.gz
 97d5b5e18735bd99f328ce45fedfeecb 30750 non-free/admin standard amd64-microcode_2.20141028.1~bpo70+1_amd64.deb
 8c9a9ce98f069d4c9e458c22a227a115 30750 non-free/admin standard amd64-microcode_2.20141028.1~bpo70+1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=9FSL
-----END PGP SIGNATURE-----


Reply to: