Change logs for intel-microcode source package in Trusty

  • intel-microcode (3.20190618.0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: New upstream microcode datafile 20190618
        - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
        + Updated Microcodes:
          sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
          sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
          sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
        + Add MDS mitigation support for Sandy Bridge server and Core-X
          processor families.(LP: #1830123)
    
     -- Steve Beattie <email address hidden>  Thu, 20 Jun 2019 06:44:56 -0700
  • intel-microcode (3.20190514.0ubuntu0.14.04.2) trusty-security; urgency=medium
    
      * Update to final 20190514 microcode update. (LP: #1829745)
        - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
        + New Microcodes:
          sig 0x00030678, pf_mask 0x02, 2014.04-22, rev 0x0838, size 52224
          sig 0x00030678, pf_mask 0x0c, 2014.04-22, rev 0x0838, size 52224
          sig 0x00030679, pf_mask 0x0f, 2014.04-23, rev 0x090c, size 52224
          sig 0x000406c3, pf_mask 0x01, 2014.04-23, rev 0x0368, size 69632
          sig 0x000406c4, pf_mask 0x01, 2014.04-23, rev 0x0411, size 68608
        + Add MDS mitigation support for Cherry Trail and Bay Trail
          processor families.
    
      [ Dimitri John Ledkov ]
      * Do not override preset defaults from auto-exported conf snippets
        loaded by initramfs-tools. This thus allows other hooks, or
        alternative confdir override the built-in defaults at mkinitramfs
        time. Specifically to support generating installer/golden/bare-metal
        initrds with all microcodes for any hardware.
    
     -- Steve Beattie <email address hidden>  Mon, 20 May 2019 22:08:04 -0700
  • intel-microcode (3.20190514.0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: new upstream datafile 20190507
        - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
        + New Microcodes:
          sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104
          sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104
          sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104
        + Updated Micrcodes:
          sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288
          sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336
          sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552
          sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456
          sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384
          sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408
          sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816
          sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432
          sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504
          sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600
          sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336
          sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352
          sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720
          sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768
          sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768
          sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576
          sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552
          sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456
          sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408
          sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352
          sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264
          sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728
          sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304
          sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
          sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
          sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304
          sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280
          sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328
          sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304
          sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328
          sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304
          sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280
        + Reinstated Microcodes:
          sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
    
    intel-microcode (3.20190312.1) unstable; urgency=medium
    
      * New upstream microcode datafile 20190312
        + Removed Microcodes:
          sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
        + New Microcodes:
          sig 0x000806e9, pf_mask 0x10, 2018-10-18, rev 0x009e, size 98304
          sig 0x000806eb, pf_mask 0xd0, 2018-10-25, rev 0x00a4, size 99328
          sig 0x000806ec, pf_mask 0x94, 2019-02-12, rev 0x00b2, size 98304
          sig 0x000906ec, pf_mask 0x22, 2018-09-29, rev 0x00a2, size 98304
          sig 0x000906ed, pf_mask 0x22, 2019-02-04, rev 0x00b0, size 97280
        + Updated Microcodes:
          sig 0x000306f2, pf_mask 0x6f, 2018-11-20, rev 0x0041, size 34816
          sig 0x000306f4, pf_mask 0x80, 2018-11-06, rev 0x0013, size 17408
          sig 0x00050654, pf_mask 0xb7, 2019-01-28, rev 0x200005a, size 33792
          sig 0x00050662, pf_mask 0x10, 2018-12-06, rev 0x0019, size 32768
          sig 0x00050663, pf_mask 0x10, 2018-12-06, rev 0x7000016, size 23552
          sig 0x00050664, pf_mask 0x10, 2018-11-17, rev 0xf000014, size 23552
          sig 0x00050665, pf_mask 0x10, 2018-11-17, rev 0xe00000c, size 19456
          sig 0x000506c9, pf_mask 0x03, 2018-09-14, rev 0x0036, size 17408
          sig 0x000506ca, pf_mask 0x03, 2018-09-20, rev 0x0010, size 15360
          sig 0x000706a1, pf_mask 0x01, 2018-09-21, rev 0x002c, size 73728
          sig 0x000806e9, pf_mask 0xc0, 2018-07-16, rev 0x009a, size 98304
          sig 0x000806ea, pf_mask 0xc0, 2018-10-18, rev 0x009e, size 98304
          sig 0x000906e9, pf_mask 0x2a, 2018-07-16, rev 0x009a, size 98304
          sig 0x000906ea, pf_mask 0x22, 2018-12-12, rev 0x00aa, size 98304
          sig 0x000906eb, pf_mask 0x02, 2018-12-12, rev 0x00aa, size 99328
    
    intel-microcode (3.20180807a.2) unstable; urgency=medium
    
      * Makefile: unblacklist 0x206c2 (Westmere EP)
        According to <email address hidden>, on message to LP#1795594
        on 2018-10-09, we can ship 0x206c2 updates without restrictions.
        Also, there are no reports in the field about this update causing
        issues (closes: #907402) (LP: #1795594)
    
     -- Steve Beattie <email address hidden>  Mon, 13 May 2019 16:24:52 -0700
  • intel-microcode (3.20180807a.0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: New upstream microcode update to provide L1D cache
        flush support to mitigate L1TF (CVE-2018-3646)
        - New Microcodes:
          sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216
          sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360
          sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336
          sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
        - Updated Microcodes:
          sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288
          sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216
          sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216
          sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096
          sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288
          sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336
          sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312
          sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552
          sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432
          sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528
          sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600
          sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312
          sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328
          sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744
          sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528
          sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528
          sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384
          sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328
          sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728
          sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304
          sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304
          sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304
          sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280
          sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
        - Added back upstream but blacklisted by packaging due to the issues
          around addressing Intel SA-00030:
          sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264
      * Remaining changes from Debian:
        - debian/initramfs.hook: Default to early instead of auto, and
          install all of the microcode, not just the one matching the
          current CPU, if MODULES=most is set in the initramfs-tools config
    
    intel-microcode (3.20180703.2ubuntu1) cosmic; urgency=low
    
      * Merge from Debian unstable (LP: #1783385).  Remaining changes:
        - debian/initramfs.hook: Default to early instead of auto, and
          install all of the microcode, not just the one matching the
          current CPU, if MODULES=most is set in the initramfs-tools config
    
    intel-microcode (3.20180703.2) unstable; urgency=medium
    
      * source: fix badly named symlink that resulted in most microcode
        updates not being shipped in the binary package.  Oops!
    
    intel-microcode (3.20180703.1) unstable; urgency=medium
    
      * New upstream microcode data file 20180703 (closes: #903018)
        + Updated Microcodes:
          sig 0x000206d6, pf_mask 0x6d, 2018-05-08, rev 0x061d, size 18432
          sig 0x000206d7, pf_mask 0x6d, 2018-05-08, rev 0x0714, size 19456
          sig 0x000306e4, pf_mask 0xed, 2018-04-25, rev 0x042d, size 15360
          sig 0x000306e7, pf_mask 0xed, 2018-04-25, rev 0x0714, size 17408
          sig 0x000306f2, pf_mask 0x6f, 2018-04-20, rev 0x003d, size 33792
          sig 0x000306f4, pf_mask 0x80, 2018-04-20, rev 0x0012, size 17408
          sig 0x000406f1, pf_mask 0xef, 2018-04-19, rev 0xb00002e, size 28672
          sig 0x00050654, pf_mask 0xb7, 2018-05-15, rev 0x200004d, size 31744
          sig 0x00050665, pf_mask 0x10, 2018-04-20, rev 0xe00000a, size 18432
        + First batch of fixes for: Intel SA-00115, CVE-2018-3639, CVE-2018-3640
        + SSBD support (Spectre-v4 mitigation) and fix Spectre-v3a for:
          Sandybridge server, Ivy Bridge server, Haswell server, Skylake server,
          Broadwell server, a few HEDT Core i7/i9 models that are actually gimped
          server dies.
      * source: update symlinks to reflect id of the latest release, 20180703
    
     -- Steve Beattie <email address hidden>  Fri, 24 Aug 2018 12:09:28 -0700
  • intel-microcode (3.20180425.1~ubuntu0.14.04.2) trusty; urgency=medium
    
      * Default to early instead of auto, and install all of the microcode,
        not just the one matching the current CPU, if MODULES=most is set
        in the initramfs-tools config (LP: #1778738)
    
     -- Julian Andres Klode <email address hidden>  Tue, 26 Jun 2018 16:31:30 +0200
  • intel-microcode (3.20180425.1~ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: New upstream microcode data file 20180425 to
        provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
        for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
        Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
        - merge from Debian.
    
    intel-microcode (3.20180425.1) unstable; urgency=medium
    
      * New upstream microcode data file 20180425 (closes: #897443, #895878)
        + Updated Microcodes:
          sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
          sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
        + Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
        + Note that sig 0x000604f1 has been blacklisted from late-loading
          since Debian release 3.20171117.1.
      * source: remove undesired list files from microcode directories
      * source: switch to microcode-<id>.d/ since Intel dropped .dat
        support.
    
     -- Steve Beattie <email address hidden>  Thu, 03 May 2018 12:45:47 -0700
  • intel-microcode (3.20180312.0~ubuntu14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: New upstream microcode data file 20180312 to provide
        IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
        - New Microcodes:
          sig 0x00050653, pf mask 0x97, 2018-01-29, rev 0x1000140, size 30720
          sig 0x00050665, pf mask 0x10, 2018-01-22, rev 0xe000009, size 18432
        - Updated Microcodes:
          sig 0x000206a7, pf mask 0x12, 2018-02-07, rev 0x002d, size 12288
          sig 0x000206d6, pf mask 0x6d, 2018-01-30, rev 0x061c, size 18432
          sig 0x000206d7, pf mask 0x6d, 2018-01-26, rev 0x0713, size 19456
          sig 0x000306a9, pf mask 0x12, 2018-02-07, rev 0x001f, size 13312
          sig 0x000306c3, pf mask 0x32, 2018-01-21, rev 0x0024, size 23552
          sig 0x000306d4, pf mask 0xc0, 2018-01-18, rev 0x002a, size 18432
          sig 0x000306e4, pf mask 0xed, 2018-01-25, rev 0x042c, size 15360
          sig 0x000306e7, pf mask 0xed, 2018-02-16, rev 0x0713, size 16384
          sig 0x000306f2, pf mask 0x6f, 2018-01-19, rev 0x003c, size 33792
          sig 0x000306f4, pf mask 0x80, 2018-01-22, rev 0x0011, size 17408
          sig 0x00040651, pf mask 0x72, 2018-01-18, rev 0x0023, size 21504
          sig 0x00040661, pf mask 0x32, 2018-01-21, rev 0x0019, size 25600
          sig 0x00040671, pf mask 0x22, 2018-01-21, rev 0x001d, size 12288
          sig 0x000406e3, pf mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
          sig 0x00050654, pf mask 0xb7, 2018-01-26, rev 0x2000043, size 28672
          sig 0x00050662, pf mask 0x10, 2018-01-22, rev 0x0015, size 31744
          sig 0x00050663, pf mask 0x10, 2018-01-22, rev 0x7000012, size 22528
          sig 0x00050664, pf mask 0x10, 2018-01-22, rev 0xf000011, size 22528
          sig 0x000506e3, pf mask 0x36, 2017-11-16, rev 0x00c2, size 99328
          sig 0x000806e9, pf mask 0xc0, 2018-01-21, rev 0x0084, size 98304
          sig 0x000806ea, pf mask 0xc0, 2018-01-21, rev 0x0084, size 97280
          sig 0x000906e9, pf mask 0x2a, 2018-01-21, rev 0x0084, size 98304
          sig 0x000906ea, pf mask 0x22, 2018-01-21, rev 0x0084, size 96256
          sig 0x000906eb, pf mask 0x02, 2018-01-21, rev 0x0084, size 98304
        - CVE-2017-5715
    
     -- Tyler Hicks <email address hidden>  Tue, 13 Mar 2018 20:10:18 +0000
  • intel-microcode (3.20180108.0+really20170707ubuntu14.04.1) trusty-security; urgency=medium
    
      * Revert to 20170707 version of microcode because of regressions on
        certain hardware. (LP: #1742933)
    
     -- Marc Deslauriers <email address hidden>  Mon, 22 Jan 2018 07:21:24 -0500
  • intel-microcode (3.20180108.0~ubuntu14.04.2) trusty-security; urgency=medium
    
      * Sync package to xenial's latest update
      * New upstream microcode datafile 20180108
        + New Microcodes:
          sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384
          sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
          sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280
          sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304
        + Updated Microcodes:
          sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552
          sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432
          sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360
          sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792
          sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408
          sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528
          sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600
          sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312
          sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
          sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648
          sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744
          sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528
          sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328
          sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
          sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
          sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304
       * source: remove unneeded intel-ucode/ directory
       * source: remove superseded upstream data file: 20170707
    
     -- Marc Deslauriers <email address hidden>  Tue, 09 Jan 2018 13:28:52 -0500
  • intel-microcode (2.20140913-t-1ubuntu1) trusty; urgency=medium
    
      * Fixes for Haswell platforms
        New upstream data file: microcode-20140913.dat
        -LP: #1370352
     -- Tim Gardner <email address hidden>   Wed, 17 Sep 2014 09:40:33 -0600
  • intel-microcode (2.20140624-t-1ubuntu2) trusty; urgency=medium
    
      * New upstream data file: microcode-20140624
        -LP: #1335156
     -- Tim Gardner <email address hidden>   Fri, 27 Jun 2014 09:22:06 -0600
  • intel-microcode (2.20140430.1ubuntu1) trusty; urgency=medium
    
      * A new CPU microcode release, 20140430 version was released and can be downloaded from:
        https://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=23829
        -LP: #1319114
     -- Tim Gardner <email address hidden>   Tue, 13 May 2014 11:50:12 -0600
  • intel-microcode (2.20140122.1) unstable; urgency=low
    
    
      * New upstream microcode data file 20140122
        + New Microcodes:
          sig 0x00040661, pf mask 0x32, 2013-08-21, rev 0x000f, size 23552
        + Updated Microcodes:
          sig 0x000106e5, pf mask 0x13, 2013-08-20, rev 0x0007, size 7168
          sig 0x000306c3, pf mask 0x32, 2013-08-16, rev 0x0017, size 20480
          sig 0x000306e4, pf mask 0xed, 2013-07-09, rev 0x0416, size 11264
          sig 0x00040651, pf mask 0x72, 2013-09-14, rev 0x0017, size 19456
    
     -- Henrique de Moraes Holschuh <email address hidden>  Sat, 01 Feb 2014 15:39:03 -0200
  • intel-microcode (1.20130906.1ubuntu3) trusty; urgency=medium
    
      * Added microcode-20140122.dat
        -LP: #1273532
     -- Tim Gardner <email address hidden>   Tue, 28 Jan 2014 13:37:23 +0000
  • intel-microcode (1.20130906.1ubuntu2) saucy; urgency=low
    
      * Added microcode-20130906.dat
        -LP: #1226911
     -- Tim Gardner <email address hidden>   Thu, 19 Sep 2013 13:40:26 -0600