[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted amd64-microcode 3.20180524.1~bpo9+1 (amd64 i386 source) into stretch-backports, stretch-backports



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 28 May 2018 08:09:01 -0300
Source: amd64-microcode
Binary: amd64-microcode
Architecture: amd64 i386 source
Version: 3.20180524.1~bpo9+1
Distribution: stretch-backports
Urgency: high
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 886382
Description: 
 amd64-microcode - Processor microcode firmware for AMD CPUs
Changes:
 amd64-microcode (3.20180524.1~bpo9+1) stretch-backports; urgency=medium
 .
   * Rebuild for stretch-backports (no changes)
 .
 amd64-microcode (3.20180524.1) unstable; urgency=high
 .
   * New microcode update packages from AMD upstream:
     + Re-added Microcodes:
       sig 0x00610f01, patch id 0x06001119, 2012-07-13
   * This update avoids regressing sig 0x610f01 processors on systems with
     outdated firmware by adding back exactly the same microcode patch that was
     present before [for these processors].  It does not implement Spectre-v2
     mitigation for these processors.
   * README: update for new release
 .
 amd64-microcode (3.20180515.1) unstable; urgency=high
 .
   * New microcode update packages from AMD upstream:
     + New Microcodes:
       sig 0x00800f12, patch id 0x08001227, 2018-02-09
     + Updated Microcodes:
       sig 0x00600f12, patch id 0x0600063e, 2018-02-07
       sig 0x00600f20, patch id 0x06000852, 2018-02-06
     + Removed Microcodes:
       sig 0x00610f01, patch id 0x06001119, 2012-07-13
   * Adds Spectre v2 (CVE-2017-5715) microcode-based mitigation support,
     plus other unspecified fixes/updates.
   * README, debian/copyright: update for new release
 .
 amd64-microcode (3.20171205.2) unstable; urgency=medium
 .
   * debian/control: update Vcs-* fields for salsa.debian.org
 .
 amd64-microcode (3.20171205.1) unstable; urgency=high
 .
   * New microcode updates (closes: #886382):
     sig 0x00800f12, patch id 0x08001213, 2017-12-05
     Thanks to SuSE for distributing these ahead of AMD's official release!
   * Add IBPB support for family 17h AMD processors (CVE-2017-5715)
   * README: describe source for faml17h microcode update
   * Upload to unstable to match IBPB microcode support on Intel in Debian
     unstable.
   * WARNING: requires at least kernel 4.15, 4.14.13, 4.9.76, 4.4.111 (or a
     backport of commit f4e9b7af0cd58dd039a0fb2cd67d57cea4889abf
     "x86/microcode/AMD: Add support for fam17h microcode loading") otherwise
     it will not be applied to the processor.
Checksums-Sha1: 
 d269a74f9306ba4ebe6b7402fd40afb14d6d63ea 1711 amd64-microcode_3.20180524.1~bpo9+1.dsc
 17c8737da48fbfedd5656e34664ca207cba9c4cd 33768 amd64-microcode_3.20180524.1~bpo9+1.tar.xz
 b7e5b9a1039080aa992594c75d5a90c9de1f3ca7 5914 amd64-microcode_3.20180524.1~bpo9+1_amd64.buildinfo
 db3b543a81e5d6148d0511fe1de416f798443a46 34430 amd64-microcode_3.20180524.1~bpo9+1_amd64.deb
 d570efa3b3d19bc7945253874524281f23db40ac 4680 amd64-microcode_3.20180524.1~bpo9+1_i386.buildinfo
 5be8fb42fabef8f6586ea653aaf4bde56296f534 34434 amd64-microcode_3.20180524.1~bpo9+1_i386.deb
Checksums-Sha256: 
 6009777f199a06d655f4c50e0d4d0c0b971b77a37039ea42cfe2cadb6911ed41 1711 amd64-microcode_3.20180524.1~bpo9+1.dsc
 44bc0102b32fc7eb8dd980883bf7d346c5b737314da1c61ebdc0d6b10f4ec8b1 33768 amd64-microcode_3.20180524.1~bpo9+1.tar.xz
 0d80822f3320c1b2098e427d81ea2a74c8b9a34d621ce74108514eb2e3628d36 5914 amd64-microcode_3.20180524.1~bpo9+1_amd64.buildinfo
 1389d9282e3388675db2127b452e7bc7147df3ea0e145c7dc5362077458e72c2 34430 amd64-microcode_3.20180524.1~bpo9+1_amd64.deb
 de8efc1641ab8d40fd422903afbb7f6e872a97270c513e4d8437b8d5c175390e 4680 amd64-microcode_3.20180524.1~bpo9+1_i386.buildinfo
 3edefc6a294590cd20cec9d83c1215778d309078762870970aef2a159b67aa74 34434 amd64-microcode_3.20180524.1~bpo9+1_i386.deb
Files: 
 79eec856fd85913b2aafe86b1177af0a 1711 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1.dsc
 a431b81485649901e9d5eb4dc536f765 33768 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1.tar.xz
 0467517c5b9d8b0b889b0108835a9e50 5914 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_amd64.buildinfo
 776b5eaee6dd688bcb815d718adcc88c 34430 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_amd64.deb
 7756eb9162480651ada544fbc3e505ed 4680 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_i386.buildinfo
 61ba1b30bb3901fb1ec02f65b43d2360 34434 non-free/admin standard amd64-microcode_3.20180524.1~bpo9+1_i386.deb

-----BEGIN PGP SIGNATURE-----
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=ap+r
-----END PGP SIGNATURE-----


Reply to: