Back to intel-microcode PTS page

Accepted intel-microcode 3.20161104.1 (source amd64) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 09 Nov 2016 20:35:57 -0200
Source: intel-microcode
Binary: intel-microcode
Architecture: source amd64
Version: 3.20161104.1
Distribution: unstable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Description:
 intel-microcode - Processor microcode firmware for Intel CPUs
Changes:
 intel-microcode (3.20161104.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20161104
     + New Microcodes:
       sig 0x00050663, pf_mask 0x10, 2016-10-12, rev 0x700000d, size 20480
       sig 0x00050664, pf_mask 0x10, 2016-06-02, rev 0xf00000a, size 21504
     + Updated Microcodes:
       sig 0x000306f2, pf_mask 0x6f, 2016-10-07, rev 0x0039, size 32768
       sig 0x000406f1, pf_mask 0xef, 2016-10-07, rev 0xb00001f, size 25600
     + Removed Microcodes:
       sig 0x000106e4, pf_mask 0x09, 2013-07-01, rev 0x0003, size 6144
     + This update fixes critical errata on Broadwell-DE V2/Y0 (Xeon
       D-1500 family), including one that can crash VMWare ESXi 6 with
       #PF (VMWare KB2146388), and could affect Linux as well.  This same
       issue was fixed for the E5v4 Xeons in release 20160607
     + This update fixes undisclosed (and likely critical) errata on
       Broadwell-E Core i7-68xxK/69xxK/6950X, Broadwell-EP/EX B0/R0/M0
       Xeon E5v4 and Xeon E7v4, and Haswell-EP Xeon E5v3
     + This release deletes the microcode update for the Jasper Forest
       embedded Xeons (Xeon EC35xx/LC35xx/EC35xx/LC55xx), for undisclosed
       reasons.  The deleted microcode is outdated when compared with the
       updates for the other Nehalem Xeons
   * Makefile: always exclude microcode sig 0x206c2 just in case
     Intel is quite clear in the Intel SA-00030 advisory text that recent
     revisions (0x14 and later?) of the 0x206c2 microcode updates must be
     installed along with updated SINIT ACM on vPro systems (i.e. through
     an UEFI/BIOS firmware update).  This is a defensive change so that we
     don't ship such a microcode update in the future by mistake
   * source: remove partially superseded upstream data file: 20160714
   * source: remove superseded upstream data file: 20101123
   * changelog: replace "pf mask" with "pf_mask"
   * control, compat: switch debhelper compatibility level to 9
   * control: bump standards-version, no changes required
Checksums-Sha1:
 de163e6a361bd7646e82dc0e8d1171e821f36a90 1783 intel-microcode_3.20161104.1.dsc
 d5d8bfc526434bd2fa4e65171acc1aa92030df74 1159412 intel-microcode_3.20161104.1.tar.xz
 9e2d314104d51ac149a648e2b5b3abffa6aaaaf1 4441 intel-microcode_3.20161104.1_20161109T224239z-b806daaf.buildinfo
 7f84e4cdc81a123a5d0ea928cc4ffdf70408dcf1 696190 intel-microcode_3.20161104.1_amd64.deb
Checksums-Sha256:
 90eafee13c9fb99a773873e0810a710bd379952e2f73e1271629401dddd80fc2 1783 intel-microcode_3.20161104.1.dsc
 bf8116678b532a5d7160822d3b5dab7715a5d95ba80e851be48793bed1c80340 1159412 intel-microcode_3.20161104.1.tar.xz
 e5466026637304da24cf2f79415236999b14af1df69aa291c8bc8e290245ef85 4441 intel-microcode_3.20161104.1_20161109T224239z-b806daaf.buildinfo
 97b249c826398078833593651ac99d3a51a4a4750dd47b79b6f2c69c380e9c14 696190 intel-microcode_3.20161104.1_amd64.deb
Files:
 03e9cc43cffa196bc78404ff51ecf59f 1783 non-free/admin standard intel-microcode_3.20161104.1.dsc
 4c450de6a6c45da30f12056d7e10db5c 1159412 non-free/admin standard intel-microcode_3.20161104.1.tar.xz
 b806daaf39454e8dbddef1dcf114118f 4441 non-free/admin standard intel-microcode_3.20161104.1_20161109T224239z-b806daaf.buildinfo
 3d8b479b568403c0adb2b750f4d9f6b8 696190 non-free/admin standard intel-microcode_3.20161104.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=HWA9
-----END PGP SIGNATURE-----