[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted intel-microcode 3.20160714.1~deb8u1 (amd64 i386 source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 07 Aug 2016 21:48:59 -0300
Source: intel-microcode
Binary: intel-microcode
Architecture: amd64 i386 source
Version: 3.20160714.1~deb8u1
Distribution: stable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 814301 828819
Description: 
 intel-microcode - Processor microcode firmware for Intel CPUs
Changes:
 intel-microcode (3.20160714.1~deb8u1) stable; urgency=medium
 .
   * Rebuild for Debian jessie stable update (no changes)
   * STABLE RELEASE MANAGER INFORMATION:
     + This is the same package which is in unstable since 2016-07-22,
       and stretch (testing) and jessie-backports since 2016-07-28,
       with no issues reported
     + Contains updated microcode for:
       Skylake/H/DT, Broadwell/E/EP/H/DE/WS, Haswell/E/WS/EP/EX, and their
       usual variants (U/ULT,Y,S...): mobile, desktop, embedded, single-
       and dual-socket server/workstation.  Also includes related Pentium
       and Celeron
     + Somewhat unusually, this release includes an update for the
       multi-socket Haswell-EX E7-v3 Xeon server processors
     + Fixes critical issues on Intel Skylake processors, such as:
       - TSX unpredictable behavior
       - AVX data/calculation corruption
       - High-hitting crashes and hangs related to MCEs and power
         management errata that might make it impossible to even install
         Debian in the first place (systems with very outdated firmware)
     + Likely fixes a recently identified, critical but low-hitting TSX
       erratum on Broadwell, Broadwell-E and related Xeons
       (Broadwell-DE/WS/EP: Xeon-D 1500, E3-v4 and E5-v4)
     + Fix Broadwell-DE (Xeon-D 1500) errata (incomplete list):
       Stepping V-1: BDE58, BDE56, BDE55, BDE50, BDE44, BDE41, BDE38,
                     BDE10, BDE9, BDE8, BDE7
       Stepping Y-0: LAN1, BDE67, BDE68
     + Might fix Haswell-EP Xeon E5-v3 power management regression
       which is already present in the packages currently in jessie
       (#815990)
     + Fixes undisclosed errata on Xeon E7-v3 48xx/88xx
 .
 intel-microcode (3.20160714.1~bpo8+1) jessie-backports; urgency=medium
 .
   * Rebuild for jessie-backports (no changes)
 .
 intel-microcode (3.20160714.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20160714
     + Updated Microcodes:
       sig 0x000306f4, pf mask 0x80, 2016-06-07, rev 0x000d, size 15360
       sig 0x000406e3, pf mask 0xc0, 2016-06-22, rev 0x009e, size 97280
       sig 0x000406f1, pf mask 0xef, 2016-06-06, rev 0xb00001d, size 25600
       sig 0x000506e3, pf mask 0x36, 2016-06-22, rev 0x009e, size 97280
     + This release hopefully fixes a hang when updating the microcode on
       some Skylake-U D-1/Skylake-Y D-1 (sig 0x406e3, pf 0x80) systems
   * source: remove superseded upstream data file: 20160607
 .
 intel-microcode (3.20160607.2~bpo8+1) jessie-backports; urgency=medium
 .
   * Rebuild for jessie-backports (no changes)
 .
 intel-microcode (3.20160607.2) unstable; urgency=low
 .
   * REMOVE microcode:
     sig 0x000406e3, pf mask 0xc0, 2016-04-06, rev 0x008a, size 96256
     (closes: #828819)
   * The Core i7-6500U and m3-6Y30 processors (Skylake-UY D-1,
     sig=0x406e3, pf=0x80) may hang while attempting an early microcode
     update to revision 0x8a, apparently due to some sort of firmware
     dependency.  On affected systems, the only way to avoid the issue is
     to get a firmware update that includes microcode revision 0x8a or
     later.  At this time, there are reports of both sucessful and failed
     updates on the m3-6Y30, and only of failed updates on the i7-6500U.
     There are no reports about Skylake-U K-1 (pf=0x40).
   + WARNING: it is unsafe to use a system based on an Intel Skylake-U/Y
     processor with microcode earlier than revision 0x8a, due to several
     critical errata that cause unpredictable behavior, data corruption,
     and other problems.  Users *must* update their firmware to get
     microcode 0x8a or newer, and keep it up-to-date.
 .
 intel-microcode (3.20160607.1~bpo8+1) jessie-backports; urgency=medium
 .
   * Rebuild for jessie-backports (no changes)
 .
 intel-microcode (3.20160607.1) unstable; urgency=medium
 .
   * New upstream microcode data file 20160607
     + New Microcodes:
       sig 0x000406e3, pf mask 0xc0, 2016-04-06, rev 0x008a, size 96256
       sig 0x000406f1, pf mask 0xef, 2016-05-20, rev 0xb00001c, size 25600
       sig 0x00050662, pf mask 0x10, 2015-12-12, rev 0x000f, size 28672
       sig 0x000506e3, pf mask 0x36, 2016-04-06, rev 0x008a, size 96256
     + Updated Microcodes:
       sig 0x000306c3, pf mask 0x32, 2016-03-16, rev 0x0020, size 22528
       sig 0x000306d4, pf mask 0xc0, 2016-04-29, rev 0x0024, size 17408
       sig 0x000306f2, pf mask 0x6f, 2016-03-28, rev 0x0038, size 32768
       sig 0x000306f4, pf mask 0x80, 2016-02-11, rev 0x000a, size 15360
       sig 0x00040651, pf mask 0x72, 2016-04-01, rev 0x001f, size 20480
       sig 0x00040661, pf mask 0x32, 2016-04-01, rev 0x0016, size 24576
       sig 0x00040671, pf mask 0x22, 2016-04-29, rev 0x0016, size 11264
   * source: remove superseded upstream data file: 20151106.
   * control: change upstream URL to a search for "linux microcode"
     Unfortunately, many of the per-processor-model feeds have not been
     updated for microcode release 20160607.  Switch to the general search
     page as the upstream URL.
   * README.Debian: fix duplicated word 'to'
 .
 intel-microcode (3.20151106.2) unstable; urgency=medium
 .
   * Makefile: make the build less verbose.
   * debian/changelog: fix error in past entry.
     Correct the version of the microcode that caused bug #776431,
     in the entry for version 3.20150121.1.
   * initramfs: don't force_load microcode.ko when missing.
     Detect a missing microcode.ko and don't attempt to force_load() it,
     otherwise we get spurious warnings at boot.  In verbose mode, log the
     fact that the microcode driver is modular.   For Linux 4.4 and later,
     skip the entire module loading logic, since the microcode driver cannot
     be modular for those kernels (closes: #814301).
   * initramfs: update copyright notice
   * initramfs: use iucode_tool -l for verbose mode
   * README.Debian: enhance and add recovery instructions.
     Rewrite large parts of the README.Debian document, and add recovery
     instructions (use of the "dis_ucode_ldr" kernel parameter).
 .
 intel-microcode (3.20151106.1~bpo8+1) jessie-backports; urgency=medium
 .
   * Rebuild for jessie-backports (no changes)
Checksums-Sha1: 
 edd31c2e5243c980c17d830644dc29076da1d9fa 1811 intel-microcode_3.20160714.1~deb8u1.dsc
 d411975502d2b5cecbfaa3764b0e8a99efe12643 1153284 intel-microcode_3.20160714.1~deb8u1.tar.xz
 570aa8693660a6f287a452343206499415dbefee 660376 intel-microcode_3.20160714.1~deb8u1_amd64.deb
 350404858f087cc684c9f69d2fd883926bdb516b 801078 intel-microcode_3.20160714.1~deb8u1_i386.deb
Checksums-Sha256: 
 7f0502e519576ca4b05c70d37fc3aebf61add249fa2d74f5b37fccf800cd9c91 1811 intel-microcode_3.20160714.1~deb8u1.dsc
 72a8df6cddc54f52f667075e97f972485ffcab3ade44f3f1cc9f363802957f0d 1153284 intel-microcode_3.20160714.1~deb8u1.tar.xz
 e0a6ee685593aa5c5d667df909d340f48947e9d94640fe18cf9b12a5177ce921 660376 intel-microcode_3.20160714.1~deb8u1_amd64.deb
 d8abe6c4f10fa02b97c2a1adbb7d7728cf37cbf9e1e6ae91db62800837cbb1b2 801078 intel-microcode_3.20160714.1~deb8u1_i386.deb
Files: 
 748d587994fa42963bc04dd97748b2c2 1811 non-free/admin standard intel-microcode_3.20160714.1~deb8u1.dsc
 d709a66b67e9052b0bc3143fc483d23f 1153284 non-free/admin standard intel-microcode_3.20160714.1~deb8u1.tar.xz
 f82d9d61743f863ae835a04195eecb1b 660376 non-free/admin standard intel-microcode_3.20160714.1~deb8u1_amd64.deb
 79b6b51479db0382f1e4225daf2a7f42 801078 non-free/admin standard intel-microcode_3.20160714.1~deb8u1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=bbz5
-----END PGP SIGNATURE-----


Reply to: