Accepted intel-microcode 1.20130808.0+deb7u1 (source amd64)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 17 Aug 2013 22:44:59 -0300
Source: intel-microcode
Binary: intel-microcode
Architecture: source amd64
Version: 1.20130808.0+deb7u1
Distribution: stable
Urgency: high
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Description:
intel-microcode - Processor microcode firmware for Intel CPUs
Closes: 692535
Changes:
intel-microcode (1.20130808.0+deb7u1) stable; urgency=high
.
* New upstream microcode data file 20130808
+ New Microcodes:
sig 0x000306c3, pf mask 0x32, 2013-07-02, rev 0x0012, size 19456
sig 0x000306e4, pf mask 0xed, 2013-06-13, rev 0x0415, size 11264
sig 0x000306e6, pf mask 0xed, 2013-06-19, rev 0x0600, size 11264
sig 0x00040651, pf mask 0x72, 2013-07-02, rev 0x0015, size 18432
+ Updated Microcodes (removed in the past):
sig 0x000106a5, pf mask 0x03, 2013-06-21, rev 0x0019, size 10240
+ Updated Microcodes:
sig 0x000106a4, pf mask 0x03, 2013-06-21, rev 0x0012, size 14336
sig 0x000106e5, pf mask 0x13, 2013-07-01, rev 0x0006, size 7168
sig 0x00020652, pf mask 0x12, 2013-06-26, rev 0x000e, size 8192
sig 0x00020655, pf mask 0x92, 2013-06-28, rev 0x0004, size 3072
sig 0x000206a7, pf mask 0x12, 2013-06-12, rev 0x0029, size 10240
sig 0x000206d7, pf mask 0x6d, 2013-06-17, rev 0x0710, size 17408
sig 0x000206f2, pf mask 0x05, 2013-06-18, rev 0x0037, size 13312
sig 0x000306a9, pf mask 0x12, 2013-06-13, rev 0x0019, size 12288
+ Removed Microcodes:
sig 0x000106e4, pf mask 0x09, 2010-03-08, rev 0x0002, size 5120
+ This microcode update has been documented by Intel to fix a severe
security issue (refer to LP bug 1212497); This update is known to fix
several nasty errata on 1st to 4th gens of Core i3/i5/i7, and Xeon
5500 and later, including but not limited to:
+ AAK167/BT248: Virtual APIC accesses with 32-bit PAE paging
may cause system crash
+ AAK170/BT246: The upper 32 bits of CR3 may be incorrectly used
with 32-bit paging
+ Erratum AAK167/BT248 is nasty: "If a logical processor has EPT (Extended
Page Tables) enabled, is using 32-bit PAE paging, and accesses the
virtual-APIC page then a complex sequence of internal processor
micro-architectural events may cause an incorrect address translation or
machine check on either logical processor. This erratum may result in
unexpected faults, an uncorrectable TLB error logged in
IA32_MCi_STATUS.MCACOD (bits [15:0]), a guest or hypervisor crash, or
other unpredictable system behavior"
* kernel preinst: simplify and load microcode and cpuid modules
* postinst: attempt to load microcode module (closes: #692535)
* Remove from the source package an unused upstream microcode bundle,
which has been completely superseded by later bundles:
microcode-20130222.dat
* Use 1.20130808.0+deb7u1 as the Debian version to start a new branch that
sorts before 1.20130808.1, which was uploaded to unstable. Further
updates targeting stable will go into the 1.x branch. Further updates
targeting unstable and stable-backports will go into the 2.x branch
Checksums-Sha1:
ac40fd7c13cc69aa2a4f52d255126c890d5ef042 1453 intel-microcode_1.20130808.0+deb7u1.dsc
a24b201a6528e7cbf7e447d465b61fd5a983d615 807732 intel-microcode_1.20130808.0+deb7u1.tar.xz
ec5d49ad0c04408ee9439a96b160fb816c137e04 339962 intel-microcode_1.20130808.0+deb7u1_amd64.deb
Checksums-Sha256:
0a0ff3dae328af18fbdacd52bfd8ffaa729552fd64ef61ce8bbd83d2f8972cdb 1453 intel-microcode_1.20130808.0+deb7u1.dsc
c7bfc38fea2f5346fa8dae284a2c46ebf484f6c345332858ab16842d6f473cd5 807732 intel-microcode_1.20130808.0+deb7u1.tar.xz
d8c0d32b878a797d83b99b37f756381eaaf2b386e64c6b663a4c3e2e792ebe1c 339962 intel-microcode_1.20130808.0+deb7u1_amd64.deb
Files:
21b907b495b0122296a8eb2c1aa297e3 1453 non-free/admin standard intel-microcode_1.20130808.0+deb7u1.dsc
78566ca82caaac7ae0da8f6e83323355 807732 non-free/admin standard intel-microcode_1.20130808.0+deb7u1.tar.xz
86a7fa4ebcf060dd0f8f361d852b66fb 339962 non-free/admin standard intel-microcode_1.20130808.0+deb7u1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBCgAGBQJSEX1jAAoJEBZRjutISTEt1N8IAIboRNRS6koBsBPqdobmL8Ml
ANDNgaHSWU2l314M2P2cvrHUic9j4VGpm7wf92YFk+/JA7djPFKjtSubwv2lJh/4
lcmtDGMGDpG+sA8UdVMjFBRls5/Y/rhkoiNfX6WQ/E3Y6Tj7Vz2CMKXVu04sqSfu
coiDbiWCZDy/ex4s6xWJXS6aTYlhINIHj5Wb7IMC4joDoiMOEwpN7rb0viOiMHOJ
qOEjGEDAoLgjMNMN6RsnHQ1+Sqp19oWSc/ln71rnpkemNQqrGmzbQFyre1YrCDjw
2pOWx/5uoUYeMbnomQu7DbT74kYGi1rllV/9eZ6QN+M08aNzbiojRUYMcvG3AGg=
=JKqB
-----END PGP SIGNATURE-----
Reply to: