intel-microcode 3.20180425.1~ubuntu0.14.04.1 source package in Ubuntu

Changelog

intel-microcode (3.20180425.1~ubuntu0.14.04.1) trusty-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode data file 20180425 to
    provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
    for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
    Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
    - merge from Debian.

intel-microcode (3.20180425.1) unstable; urgency=medium

  * New upstream microcode data file 20180425 (closes: #897443, #895878)
    + Updated Microcodes:
      sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
      sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
    + Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
    + Note that sig 0x000604f1 has been blacklisted from late-loading
      since Debian release 3.20171117.1.
  * source: remove undesired list files from microcode directories
  * source: switch to microcode-<id>.d/ since Intel dropped .dat
    support.

 -- Steve Beattie <email address hidden>  Thu, 03 May 2018 12:45:47 -0700

Upload details

Uploaded by:
Steve Beattie on 2018-05-04
Uploaded to:
Trusty
Original maintainer:
Ubuntu Developers
Architectures:
i386 amd64 x32
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Trusty: [FULLYBUILT] amd64 [FULLYBUILT] i386

Downloads

File Size SHA-256 Checksum
intel-microcode_3.20180425.1~ubuntu0.14.04.1.tar.xz 1.8 MiB 9d591e782c6d4dcb477c0bed211d5a6b5b81946b8c2db43a3afa6a64a9d11bdd
intel-microcode_3.20180425.1~ubuntu0.14.04.1.dsc 1.9 KiB 79211298146b344309beb65254658806c766aa0f7b7dbf0dd51cae7e91660684

View changes file

Binary packages built by this source

intel-microcode: Processor microcode firmware for Intel CPUs

 This package contains updated system processor microcode for
 Intel i686 and Intel X86-64 processors. Intel releases microcode
 updates to correct processor behavior as documented in the
 respective processor specification updates.
 .
 For AMD processors, please refer to the amd64-microcode package.