Accepted amd64-microcode 3.20180524.1~bpo9+1 (amd64 i386 source) into stretch-backports, stretch-backports
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 28 May 2018 08:09:01 -0300
Source: amd64-microcode
Binary: amd64-microcode
Architecture: amd64 i386 source
Version: 3.20180524.1~bpo9+1
Distribution: stretch-backports
Urgency: high
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 886382
Description:
amd64-microcode - Processor microcode firmware for AMD CPUs
Changes:
amd64-microcode (3.20180524.1~bpo9+1) stretch-backports; urgency=medium
.
* Rebuild for stretch-backports (no changes)
.
amd64-microcode (3.20180524.1) unstable; urgency=high
.
* New microcode update packages from AMD upstream:
+ Re-added Microcodes:
sig 0x00610f01, patch id 0x06001119, 2012-07-13
* This update avoids regressing sig 0x610f01 processors on systems with
outdated firmware by adding back exactly the same microcode patch that was
present before [for these processors]. It does not implement Spectre-v2
mitigation for these processors.
* README: update for new release
.
amd64-microcode (3.20180515.1) unstable; urgency=high
.
* New microcode update packages from AMD upstream:
+ New Microcodes:
sig 0x00800f12, patch id 0x08001227, 2018-02-09
+ Updated Microcodes:
sig 0x00600f12, patch id 0x0600063e, 2018-02-07
sig 0x00600f20, patch id 0x06000852, 2018-02-06
+ Removed Microcodes:
sig 0x00610f01, patch id 0x06001119, 2012-07-13
* Adds Spectre v2 (CVE-2017-5715) microcode-based mitigation support,
plus other unspecified fixes/updates.
* README, debian/copyright: update for new release
.
amd64-microcode (3.20171205.2) unstable; urgency=medium
.
* debian/control: update Vcs-* fields for salsa.debian.org
.
amd64-microcode (3.20171205.1) unstable; urgency=high
.
* New microcode updates (closes: #886382):
sig 0x00800f12, patch id 0x08001213, 2017-12-05
Thanks to SuSE for distributing these ahead of AMD's official release!
* Add IBPB support for family 17h AMD processors (CVE-2017-5715)
* README: describe source for faml17h microcode update
* Upload to unstable to match IBPB microcode support on Intel in Debian
unstable.
* WARNING: requires at least kernel 4.15, 4.14.13, 4.9.76, 4.4.111 (or a
backport of commit f4e9b7af0cd58dd039a0fb2cd67d57cea4889abf
"x86/microcode/AMD: Add support for fam17h microcode loading") otherwise
it will not be applied to the processor.
Checksums-Sha1:
d269a74f9306ba4ebe6b7402fd40afb14d6d63ea 1711 amd64-microcode_3.20180524.1~bpo9+1.dsc
17c8737da48fbfedd5656e34664ca207cba9c4cd 33768 amd64-microcode_3.20180524.1~bpo9+1.tar.xz
b7e5b9a1039080aa992594c75d5a90c9de1f3ca7 5914 amd64-microcode_3.20180524.1~bpo9+1_amd64.buildinfo
db3b543a81e5d6148d0511fe1de416f798443a46 34430 amd64-microcode_3.20180524.1~bpo9+1_amd64.deb
d570efa3b3d19bc7945253874524281f23db40ac 4680 amd64-microcode_3.20180524.1~bpo9+1_i386.buildinfo
5be8fb42fabef8f6586ea653aaf4bde56296f534 34434 amd64-microcode_3.20180524.1~bpo9+1_i386.deb
Checksums-Sha256:
6009777f199a06d655f4c50e0d4d0c0b971b77a37039ea42cfe2cadb6911ed41 1711 amd64-microcode_3.20180524.1~bpo9+1.dsc
44bc0102b32fc7eb8dd980883bf7d346c5b737314da1c61ebdc0d6b10f4ec8b1 33768 amd64-microcode_3.20180524.1~bpo9+1.tar.xz
0d80822f3320c1b2098e427d81ea2a74c8b9a34d621ce74108514eb2e3628d36 5914 amd64-microcode_3.20180524.1~bpo9+1_amd64.buildinfo
1389d9282e3388675db2127b452e7bc7147df3ea0e145c7dc5362077458e72c2 34430 amd64-microcode_3.20180524.1~bpo9+1_amd64.deb
de8efc1641ab8d40fd422903afbb7f6e872a97270c513e4d8437b8d5c175390e 4680 amd64-microcode_3.20180524.1~bpo9+1_i386.buildinfo
3edefc6a294590cd20cec9d83c1215778d309078762870970aef2a159b67aa74 34434 amd64-microcode_3.20180524.1~bpo9+1_i386.deb
Files:
79eec856fd85913b2aafe86b1177af0a 1711 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1.dsc
a431b81485649901e9d5eb4dc536f765 33768 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1.tar.xz
0467517c5b9d8b0b889b0108835a9e50 5914 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_amd64.buildinfo
776b5eaee6dd688bcb815d718adcc88c 34430 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_amd64.deb
7756eb9162480651ada544fbc3e505ed 4680 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_i386.buildinfo
61ba1b30bb3901fb1ec02f65b43d2360 34434 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_i386.deb
-----BEGIN PGP SIGNATURE-----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=ap+r
-----END PGP SIGNATURE-----
Reply to: