intel-microcode 3.20180425.1~ubuntu0.18.04.1 source package in Ubuntu

Changelog

intel-microcode (3.20180425.1~ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode data file 20180425 to
    provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
    for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
    Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
    - merge from Debian.

intel-microcode (3.20180425.1) unstable; urgency=medium

  * New upstream microcode data file 20180425 (closes: #897443, #895878)
    + Updated Microcodes:
      sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
      sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
    + Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
    + Note that sig 0x000604f1 has been blacklisted from late-loading
      since Debian release 3.20171117.1.
  * source: remove undesired list files from microcode directories
  * source: switch to microcode-<id>.d/ since Intel dropped .dat
    support.

 -- Steve Beattie <email address hidden>  Thu, 03 May 2018 12:45:47 -0700

Upload details

Uploaded by:
Steve Beattie on 2018-05-04
Uploaded to:
Bionic
Original maintainer:
Ubuntu Developers
Architectures:
i386 amd64 x32
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Bionic: [FULLYBUILT] amd64 [FULLYBUILT] i386

Downloads

File Size SHA-256 Checksum
intel-microcode_3.20180425.1~ubuntu0.18.04.1.tar.xz 1.7 MiB c98cffb80c29980c06afb57301fc32e247e373abe42eb31e01c620386be2c0a1
intel-microcode_3.20180425.1~ubuntu0.18.04.1.dsc 1.9 KiB 6ae60528add8bf3e566b4802132f0792b0922a62c5494914cf1d658dad17a20c

View changes file

Binary packages built by this source

intel-microcode: Processor microcode firmware for Intel CPUs

 This package contains updated system processor microcode for
 Intel i686 and Intel X86-64 processors. Intel releases microcode
 updates to correct processor behavior as documented in the
 respective processor specification updates.
 .
 For AMD processors, please refer to the amd64-microcode package.