Back to intel-microcode PTS page

Accepted intel-microcode 3.20161104.1~deb8u1 (amd64 i386 source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 16 Dec 2016 09:42:04 -0200
Source: intel-microcode
Binary: intel-microcode
Architecture: amd64 i386 source
Version: 3.20161104.1~deb8u1
Distribution: stable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Description: 
 intel-microcode - Processor microcode firmware for Intel CPUs
Changes:
 intel-microcode (3.20161104.1~deb8u1) stable; urgency=medium
 .
   * This is the same package as 3.20161104.1 from unstable/testing and
     3.20161104.1~bpo8+1, from jessie-backports.  It has been present in
     unstable since 2016-11-09, testing since 2016-11-15, and jessie-backports
     since 2016-11-17.
   * STABLE RELEASE MANAGER INFORMATION:
     + Supposed to fix critical Intel TSX erratum BDE85 on Xeon-D 1500 Y0
     + Known to fix critical errata on several Xeon-D 1500 models which
       will crash vmware (KB2146388) and likely Linux as well
     + Fixes likely critical errata (which ones unknown) on Broadwell-E
       (Core extreme edition 5th gen, Xeon E5v4, Xeon E7v4)
     + Removes (very likely outdated) microcode for the C3500 and C5500 family
       of embedded Xeon (Jasper Forest).  These embedded Xeons are typically
       found on (older) network equipment appliances such as firewalls/IPS/IDS,
       and also on data storage devices, and thus are supposed to receive
       microcode updates through their vendors
 .
 intel-microcode (3.20161104.1) unstable; urgency=medium
 .
   * New upstream microcode datafile 20161104
     + New Microcodes:
       sig 0x00050663, pf_mask 0x10, 2016-10-12, rev 0x700000d, size 20480
       sig 0x00050664, pf_mask 0x10, 2016-06-02, rev 0xf00000a, size 21504
     + Updated Microcodes:
       sig 0x000306f2, pf_mask 0x6f, 2016-10-07, rev 0x0039, size 32768
       sig 0x000406f1, pf_mask 0xef, 2016-10-07, rev 0xb00001f, size 25600
     + Removed Microcodes:
       sig 0x000106e4, pf_mask 0x09, 2013-07-01, rev 0x0003, size 6144
     + This update fixes critical errata on Broadwell-DE V2/Y0 (Xeon
       D-1500 family), including one that can crash VMWare ESXi 6 with
       #PF (VMWare KB2146388), and could affect Linux as well.  This same
       issue was fixed for the E5v4 Xeons in release 20160607
     + This update fixes undisclosed (and likely critical) errata on
       Broadwell-E Core i7-68xxK/69xxK/6950X, Broadwell-EP/EX B0/R0/M0
       Xeon E5v4 and Xeon E7v4, and Haswell-EP Xeon E5v3
     + This release deletes the microcode update for the Jasper Forest
       embedded Xeons (Xeon EC35xx/LC35xx/EC35xx/LC55xx), for undisclosed
       reasons.  The deleted microcode is outdated when compared with the
       updates for the other Nehalem Xeons
   * Makefile: always exclude microcode sig 0x206c2 just in case
     Intel is quite clear in the Intel SA-00030 advisory text that recent
     revisions (0x14 and later?) of the 0x206c2 microcode updates must be
     installed along with updated SINIT ACM on vPro systems (i.e. through
     an UEFI/BIOS firmware update).  This is a defensive change so that we
     don't ship such a microcode update in the future by mistake
   * source: remove partially superseded upstream data file: 20160714
   * source: remove superseded upstream data file: 20101123
   * changelog: replace "pf mask" with "pf_mask"
   * control, compat: switch debhelper compatibility level to 9
   * control: bump standards-version, no changes required
Checksums-Sha1: 
 360cbc547b03eef14d9f76238692d059a56656df 1811 intel-microcode_3.20161104.1~deb8u1.dsc
 6e09e7d54eb45df6a53ff12402d884033656517c 1185820 intel-microcode_3.20161104.1~deb8u1.tar.xz
 a9eb70152c453e649a5ce67bc2ddf13847dfbf65 697416 intel-microcode_3.20161104.1~deb8u1_amd64.deb
 0b3f2977ef66befff00e1ce221443125e5815731 838102 intel-microcode_3.20161104.1~deb8u1_i386.deb
Checksums-Sha256: 
 cf43dbe5007dff04d25232921a0ac9267db1ef2460f7674dec649e6fdd5afc15 1811 intel-microcode_3.20161104.1~deb8u1.dsc
 2c07050e4bb55649a4058bbd3d367e3bfac9a7b0aa6ff5c3653399dc167f399f 1185820 intel-microcode_3.20161104.1~deb8u1.tar.xz
 48051febaec95b152e705d365052e1fbc6f3ef7306d880490a1960f0cfb6883d 697416 intel-microcode_3.20161104.1~deb8u1_amd64.deb
 0f1f4ec9ae25d8df43d0a20ad4ca8aecdd328abc3ea0038cde2376eec905c0f4 838102 intel-microcode_3.20161104.1~deb8u1_i386.deb
Files: 
 7bd16dbe03402f780f7a236d9c146d8e 1811 non-free/admin standard intel-microcode_3.20161104.1~deb8u1.dsc
 962fe4cad6c135483c89cf6dfca8e54a 1185820 non-free/admin standard intel-microcode_3.20161104.1~deb8u1.tar.xz
 98f2c1be206539406aa015bcfb7e7ec7 697416 non-free/admin standard intel-microcode_3.20161104.1~deb8u1_amd64.deb
 60688d5d13ab656a17b80eb485e7cd7f 838102 non-free/admin standard intel-microcode_3.20161104.1~deb8u1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=B0vt
-----END PGP SIGNATURE-----