Accepted amd64-microcode 2.20141028.1 (amd64 i386 source) into unstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 18 Dec 2014 13:36:27 -0200
Source: amd64-microcode
Binary: amd64-microcode
Architecture: amd64 i386 source
Version: 2.20141028.1
Distribution: unstable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 723081 723975 726854 753593
Description:
amd64-microcode - Processor microcode firmware for AMD CPUs
Changes:
amd64-microcode (2.20141028.1) unstable; urgency=medium
.
* Upstream release 20141028 built from linux-firmware:
+ Updated microcode patches for family 0x15 processors
+ Added microcode patches for family 0x16 processors
* AMD did not update the relevant microcode documentation (errata fixed,
microcode patch levels, etc), so there is no documentation for the
family 0x16 microcode patches, and the documentation for family 0x15 is
stale.
* postinst: do not update microcode on upgrades:
Remove code that triggers a microcode update on package upgrade. The
resulting postinst script is now identical to the one in Debian jessie's
intel-microcode, and thus known-good.
NOTE: this code was already disabled for the majority of the users due
to Debian bug #723975 (closes: #723975, #723081)
* kpreinst: remove, we don't update microcode on postinst anymore
* blacklist automated loading of the microcode module:
This is in line with the desired behavior of only updating microcode
*automatically* during system boot, when it is safer to do so. The
local admin can still load the microcode module and update the microcode
manually at any time, of course. This is in sync with the intel-microcode
packages in Debian jessie, which will also blacklist the microcode module.
Note that the initramfs will force-load the microcode module in a safe
condition, the blacklist avoids module autoloading outside the initramfs
* control: bump standards version (no changes required)
* copyright: update upstream URL and upstream copyright date
(closes: #753593)
* docs: future-proof by using a glob pattern for per-family README files
* initramfs hook: support forced installation of amd64-microcode:
Add a config file (/etc/default/amd64-microcode) to select the mode of
operation: do nothing, force install to initramfs, install only when
running on an amd64 processor (closes: #726854)
* initramfs hook: fix (likely unexploitable) issues found by shellcheck
* Add a NEWS.Debian file to warn users we will no longer update the
microcode on package upgrade (note that we were not doing it on any
Debian kernels anyway). Also document the existence of the new
/etc/default/amd64-microcode file
Checksums-Sha1:
b5bdb6a149e562e0bc50a5407681b33039fa4c28 1690 amd64-microcode_2.20141028.1.dsc
584093f774020d8e888f2416af1f8516f0e663d1 28528 amd64-microcode_2.20141028.1.tar.xz
c73c20058316ab00564cd13c9d9259f346815fd0 28820 amd64-microcode_2.20141028.1_amd64.deb
82b43f4d868b97f26f761aaba14d8839b4e31614 28832 amd64-microcode_2.20141028.1_i386.deb
Checksums-Sha256:
dba42feec983b37f7abcbfa6cd9aeaf29556821a83a90c8943a76e92acc309a1 1690 amd64-microcode_2.20141028.1.dsc
23451f78e818061b44598c3bdb567ca05a0bdc20c2879387056f39211cbe5301 28528 amd64-microcode_2.20141028.1.tar.xz
1616b3f73bc0b448d0e1179ce93974cfd64e7d75000f27442f41437db44f34c5 28820 amd64-microcode_2.20141028.1_amd64.deb
f44d919f4188bb8d5499c6ce40e321c8f75b439ac39e6adef65f9d09dcee4990 28832 amd64-microcode_2.20141028.1_i386.deb
Files:
dcef9c4153f83858775bc449b756ef67 1690 non-free/admin standard amd64-microcode_2.20141028.1.dsc
1afb71679b750fca7320bdd3f75f263c 28528 non-free/admin standard amd64-microcode_2.20141028.1.tar.xz
8117cc00a70f91be8d5bcf5967ee04f8 28820 non-free/admin standard amd64-microcode_2.20141028.1_amd64.deb
5ae258d36dac81e74b9e7890372bbdb5 28832 non-free/admin standard amd64-microcode_2.20141028.1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=ZJsu
-----END PGP SIGNATURE-----