[ubuntu/trusty-updates] intel-microcode 3.20180108.0~ubuntu14.04.2 (Accepted)
Ubuntu Archive Robot
cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Thu Jan 11 18:58:18 UTC 2018
intel-microcode (3.20180108.0~ubuntu14.04.2) trusty-security; urgency=medium
* Sync package to xenial's latest update
* New upstream microcode datafile 20180108
+ New Microcodes:
sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384
sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280
sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304
+ Updated Microcodes:
sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552
sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432
sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360
sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792
sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408
sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528
sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600
sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312
sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648
sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744
sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528
sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328
sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304
* source: remove unneeded intel-ucode/ directory
* source: remove superseded upstream data file: 20170707
intel-microcode (3.20170707.1~ubuntu16.04.0) xenial; urgency=medium
* Sync of new upstream microcode release to address Skylake, Kaby Lake
Hyper Threading bug. This is a sync of the dat files from artful
version 3.20170707.1 (LP: #1700373)
* New upstream microcode datafile 20170707
+ New Microcodes:
sig 0x00050654, pf_mask 0x97, 2017-06-01, rev 0x2000022, size 25600
sig 0x000806e9, pf_mask 0xc0, 2017-04-27, rev 0x0062, size 97280
sig 0x000806ea, pf_mask 0xc0, 2017-05-23, rev 0x0066, size 95232
sig 0x000906e9, pf_mask 0x2a, 2017-04-06, rev 0x005e, size 97280
+ This release fixes the nightmare-level errata SKZ7/SKW144/SKL150/
SKX150 (Skylake) KBL095/KBW095 (Kaby Lake) for all affected Kaby
Lake and Skylake processors: Skylake D0/R0 were fixed since the
previous upstream release (20170511). This new release adds the
fixes for Kaby Lake Y0/B0/H0 and Skylake H0 (Skylake-E/X).
+ Fix undisclosed errata in Skylake H0 (0x50654), Kaby Lake Y0
(0x806ea), Kaby Lake H0 (0x806e9), Kaby Lake B0 (0x906e9)
* source: removed superseded upstream dat files: 20101123, 20151106
This brings dat files in sync with those shipped in Arful.
* Updated Intel changelog to reflect dat file sync.
intel-microcode (3.20151106.1) unstable; urgency=medium
* New upstream microcode data file 20151106
+ New Microcodes:
sig 0x000306f4, pf mask 0x80, 2015-07-17, rev 0x0009, size 14336
sig 0x00040671, pf mask 0x22, 2015-08-03, rev 0x0013, size 11264
+ Updated Microcodes:
sig 0x000306a9, pf mask 0x12, 2015-02-26, rev 0x001c, size 12288
sig 0x000306c3, pf mask 0x32, 2015-08-13, rev 0x001e, size 21504
sig 0x000306d4, pf mask 0xc0, 2015-09-11, rev 0x0022, size 16384
sig 0x000306f2, pf mask 0x6f, 2015-08-10, rev 0x0036, size 30720
sig 0x00040651, pf mask 0x72, 2015-08-13, rev 0x001d, size 20480
* This massive Haswell + Broadwell (and related Xeons) update fixes
several critical errata, including the high-hitting BDD86/BDM101/
HSM153(?) which triggers an MCE and locks the processor core
(LP: #1509764)
* Might fix critical errata BDD51, BDM53 (TSX-related)
* source: remove superseded upstream data file: 20150121
* Add support for supplementary microcode bundles:
+ README.source: update and mention supplementary microcode
+ Makefile: support supplementary microcode
Add support for supplementary microcode bundles, which (unlike .fw
microcode override files) can be superseded by a higher revision
microcode from the latest regular microcode bundle. Also, fix the
"oldies" target to have its own exclude filter (IUC_OLDIES_EXCLUDE)
* Add support for x32 arch:
+ README.source: mention x32
+ control,rules: enable building on x32 arch (Closes: #777356)
* ucode-blacklist: add Broadwell and Haswell-E signatures
Add a missing signature for Haswell Refresh (Haswell-E) to the "must
be updated only by the early microcode update driver" list. There is
at least one report of one of the Broadwell microcode updates disabling
TSX-NI, so add them as well just in case
intel-microcode (3.20150121.1) unstable; urgency=critical
* New upstream microcode data file 20150121
* Downgraded microcodes (to a previously shipped revision):
sig 0x000306f2, pf mask 0x6f, 2014-09-03, rev 0x0029, size 28672
* The microcode downgrade fixes a very nasty regression on Xeon E5v3
processors (closes: #776431)
* critical urgency: the broken sig 0x306f2, rev 0x2b microcode shipped
in release 20150107 caused CPU core hangs and Linux boot failures.
The upstream fix was to downgrade it to the same microcode revision
that was shipped in release 20140913
* source: remove superseded upstream data file: 20150107.
* initramfs.hook: do not mix arrays and lists.
Avoid echo "foo $@", use echo "foo $*" instead. This is unlikely
to be expĺoitable, but it makes ShellCheck happier.
intel-microcode (3.20150107.1) unstable; urgency=high
* New upstream microcode data file 20150107
+ New Microcodes:
sig 0x000306d4, pf mask 0xc0, 2014-12-05, rev 0x0018, size 14336
+ Updated Microcodes:
sig 0x000306f2, pf mask 0x6f, 2014-11-21, rev 0x002d, size 28672
+ High urgency: there are fast-tracked microcode updates in this
release which imply that critical errata are being fixed
* source: remove superseded upstream data file: 20140913
intel-microcode (3.20140913.1) unstable; urgency=low
* New upstream microcode data file 20140913
+ New Microcodes:
sig 0x000306f2, pf mask 0x6f, 2014-09-03, rev 0x0029, size 28672
+ Updated Microcodes:
sig 0x000306c3, pf mask 0x32, 2014-07-03, rev 0x001c, size 21504
sig 0x00040651, pf mask 0x72, 2014-07-03, rev 0x001c, size 20480
sig 0x00040661, pf mask 0x32, 2014-07-03, rev 0x0012, size 23552
+ WARNING: UNSAFE TO BE APPLIED AT RUNTIME (lp#1370352)
* Microcode updates are now applied only through the early initramfs
+ Bump major version number
+ Requires Linux kernel v3.10 or later, other kernels unsupported
+ postinst: don't apply microcode update
+ kernel preinst: stop loading microcode module
+ modprobe.d: blacklist microcode module from autoloading outside
of the initramfs. Still load it inside the initramfs for logging
+ initramfs: always use early initramfs mode, reject kernels before
v3.10
+ README.Debian, NEWS.Debian: update
* add a microcode best-effort blacklist. This is a reactive blacklist
which renames problematic microcode data files in such a way they
will only be used for the [early] initramfs. Use it to blacklist
all Haswell microcode updates
* Allow a non-Intel box to generate an early initramfs with microcode
for an Intel box if the /etc/default/intel-microcode defaults are
changed:
+ postinst: always attempt to update the initramfs
+ initramfs: on auto mode, do nothing in a non-intel box. In
forced "early" mode, attempt to run iucode-tool. This will do
nothing (add no microcode) unless the default configuration is
changed in /etc/default/intel-microcode
+ default: update comments
* source: remove superseded upstream data file: 20140624
* README.source: remove information about lenny, oldstable
* debian/control: bump standards vesion to 3.9.6
* lintian-overrides: remove
* debian/copyright: update upstream copyright dates
* postrm: avoid use of test -a
intel-microcode (2.20140624.1) unstable; urgency=high
* New upstream microcode data file 20140624
+ Updated Microcodes:
sig 0x000306a9, pf mask 0x12, 2014-05-29, rev 0x001b, size 12288
sig 0x000306c3, pf mask 0x32, 2014-05-23, rev 0x001a, size 20480
sig 0x000306e4, pf mask 0xed, 2014-05-29, rev 0x0428, size 13312
sig 0x000306e7, pf mask 0xed, 2014-05-29, rev 0x070d, size 15360
sig 0x00040651, pf mask 0x72, 2014-05-23, rev 0x0018, size 19456
sig 0x00040661, pf mask 0x32, 2014-05-23, rev 0x0010, size 23552
+ High urgency: there are fast-tracked microcode updates in this
release which imply that critical errata are being fixed
* Intel strongly suggests that this CPU microcode update be applied
to all Ivy Bridge, Haswell, and Broadwell processors (thanks to
Canonical for the warning, refer to LP#1335156)
* This update is reported to better fix the errata addressed by the
20140430 update (refer to LP#1335156)
* source: remove superseded upstream data file: 20140430
Date: 2018-01-09 20:32:17.042128+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0~ubuntu14.04.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list