-
intel-microcode (3.20190618.0ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: New upstream microcode datafile 20190618
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ Updated Microcodes:
sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
+ Add MDS mitigation support for Sandy Bridge server and Core-X
processor families.(LP: #1830123)
-- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700
-
intel-microcode (3.20190514.0ubuntu0.14.04.2) trusty-security; urgency=medium
* Update to final 20190514 microcode update. (LP: #1829745)
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
sig 0x00030678, pf_mask 0x02, 2014.04-22, rev 0x0838, size 52224
sig 0x00030678, pf_mask 0x0c, 2014.04-22, rev 0x0838, size 52224
sig 0x00030679, pf_mask 0x0f, 2014.04-23, rev 0x090c, size 52224
sig 0x000406c3, pf_mask 0x01, 2014.04-23, rev 0x0368, size 69632
sig 0x000406c4, pf_mask 0x01, 2014.04-23, rev 0x0411, size 68608
+ Add MDS mitigation support for Cherry Trail and Bay Trail
processor families.
[ Dimitri John Ledkov ]
* Do not override preset defaults from auto-exported conf snippets
loaded by initramfs-tools. This thus allows other hooks, or
alternative confdir override the built-in defaults at mkinitramfs
time. Specifically to support generating installer/golden/bare-metal
initrds with all microcodes for any hardware.
-- Steve Beattie <email address hidden> Mon, 20 May 2019 22:08:04 -0700
-
intel-microcode (3.20190514.0ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: new upstream datafile 20190507
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x3000010, size 47104
sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x400001c, size 47104
sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x5000021, size 47104
+ Updated Micrcodes:
sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288
sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336
sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552
sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456
sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384
sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408
sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816
sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432
sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504
sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600
sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336
sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352
sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb000036, size 30720
sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x200005e, size 32768
sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768
sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x7000017, size 24576
sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf000015, size 23552
sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe00000d, size 19456
sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408
sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352
sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264
sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728
sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304
sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304
sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280
sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328
sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304
sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328
sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304
sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280
+ Reinstated Microcodes:
sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
intel-microcode (3.20190312.1) unstable; urgency=medium
* New upstream microcode datafile 20190312
+ Removed Microcodes:
sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
+ New Microcodes:
sig 0x000806e9, pf_mask 0x10, 2018-10-18, rev 0x009e, size 98304
sig 0x000806eb, pf_mask 0xd0, 2018-10-25, rev 0x00a4, size 99328
sig 0x000806ec, pf_mask 0x94, 2019-02-12, rev 0x00b2, size 98304
sig 0x000906ec, pf_mask 0x22, 2018-09-29, rev 0x00a2, size 98304
sig 0x000906ed, pf_mask 0x22, 2019-02-04, rev 0x00b0, size 97280
+ Updated Microcodes:
sig 0x000306f2, pf_mask 0x6f, 2018-11-20, rev 0x0041, size 34816
sig 0x000306f4, pf_mask 0x80, 2018-11-06, rev 0x0013, size 17408
sig 0x00050654, pf_mask 0xb7, 2019-01-28, rev 0x200005a, size 33792
sig 0x00050662, pf_mask 0x10, 2018-12-06, rev 0x0019, size 32768
sig 0x00050663, pf_mask 0x10, 2018-12-06, rev 0x7000016, size 23552
sig 0x00050664, pf_mask 0x10, 2018-11-17, rev 0xf000014, size 23552
sig 0x00050665, pf_mask 0x10, 2018-11-17, rev 0xe00000c, size 19456
sig 0x000506c9, pf_mask 0x03, 2018-09-14, rev 0x0036, size 17408
sig 0x000506ca, pf_mask 0x03, 2018-09-20, rev 0x0010, size 15360
sig 0x000706a1, pf_mask 0x01, 2018-09-21, rev 0x002c, size 73728
sig 0x000806e9, pf_mask 0xc0, 2018-07-16, rev 0x009a, size 98304
sig 0x000806ea, pf_mask 0xc0, 2018-10-18, rev 0x009e, size 98304
sig 0x000906e9, pf_mask 0x2a, 2018-07-16, rev 0x009a, size 98304
sig 0x000906ea, pf_mask 0x22, 2018-12-12, rev 0x00aa, size 98304
sig 0x000906eb, pf_mask 0x02, 2018-12-12, rev 0x00aa, size 99328
intel-microcode (3.20180807a.2) unstable; urgency=medium
* Makefile: unblacklist 0x206c2 (Westmere EP)
According to <email address hidden>, on message to LP#1795594
on 2018-10-09, we can ship 0x206c2 updates without restrictions.
Also, there are no reports in the field about this update causing
issues (closes: #907402) (LP: #1795594)
-- Steve Beattie <email address hidden> Mon, 13 May 2019 16:24:52 -0700
-
intel-microcode (3.20180807a.0ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: New upstream microcode update to provide L1D cache
flush support to mitigate L1TF (CVE-2018-3646)
- New Microcodes:
sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216
sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360
sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336
sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
- Updated Microcodes:
sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288
sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216
sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216
sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096
sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288
sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336
sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312
sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552
sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432
sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528
sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600
sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312
sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328
sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744
sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528
sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528
sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384
sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328
sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728
sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304
sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304
sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304
sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280
sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
- Added back upstream but blacklisted by packaging due to the issues
around addressing Intel SA-00030:
sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264
* Remaining changes from Debian:
- debian/initramfs.hook: Default to early instead of auto, and
install all of the microcode, not just the one matching the
current CPU, if MODULES=most is set in the initramfs-tools config
intel-microcode (3.20180703.2ubuntu1) cosmic; urgency=low
* Merge from Debian unstable (LP: #1783385). Remaining changes:
- debian/initramfs.hook: Default to early instead of auto, and
install all of the microcode, not just the one matching the
current CPU, if MODULES=most is set in the initramfs-tools config
intel-microcode (3.20180703.2) unstable; urgency=medium
* source: fix badly named symlink that resulted in most microcode
updates not being shipped in the binary package. Oops!
intel-microcode (3.20180703.1) unstable; urgency=medium
* New upstream microcode data file 20180703 (closes: #903018)
+ Updated Microcodes:
sig 0x000206d6, pf_mask 0x6d, 2018-05-08, rev 0x061d, size 18432
sig 0x000206d7, pf_mask 0x6d, 2018-05-08, rev 0x0714, size 19456
sig 0x000306e4, pf_mask 0xed, 2018-04-25, rev 0x042d, size 15360
sig 0x000306e7, pf_mask 0xed, 2018-04-25, rev 0x0714, size 17408
sig 0x000306f2, pf_mask 0x6f, 2018-04-20, rev 0x003d, size 33792
sig 0x000306f4, pf_mask 0x80, 2018-04-20, rev 0x0012, size 17408
sig 0x000406f1, pf_mask 0xef, 2018-04-19, rev 0xb00002e, size 28672
sig 0x00050654, pf_mask 0xb7, 2018-05-15, rev 0x200004d, size 31744
sig 0x00050665, pf_mask 0x10, 2018-04-20, rev 0xe00000a, size 18432
+ First batch of fixes for: Intel SA-00115, CVE-2018-3639, CVE-2018-3640
+ SSBD support (Spectre-v4 mitigation) and fix Spectre-v3a for:
Sandybridge server, Ivy Bridge server, Haswell server, Skylake server,
Broadwell server, a few HEDT Core i7/i9 models that are actually gimped
server dies.
* source: update symlinks to reflect id of the latest release, 20180703
-- Steve Beattie <email address hidden> Fri, 24 Aug 2018 12:09:28 -0700
-
intel-microcode (3.20180425.1~ubuntu0.14.04.2) trusty; urgency=medium
* Default to early instead of auto, and install all of the microcode,
not just the one matching the current CPU, if MODULES=most is set
in the initramfs-tools config (LP: #1778738)
-- Julian Andres Klode <email address hidden> Tue, 26 Jun 2018 16:31:30 +0200
-
intel-microcode (3.20180425.1~ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: New upstream microcode data file 20180425 to
provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
- merge from Debian.
intel-microcode (3.20180425.1) unstable; urgency=medium
* New upstream microcode data file 20180425 (closes: #897443, #895878)
+ Updated Microcodes:
sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
+ Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
+ Note that sig 0x000604f1 has been blacklisted from late-loading
since Debian release 3.20171117.1.
* source: remove undesired list files from microcode directories
* source: switch to microcode-<id>.d/ since Intel dropped .dat
support.
-- Steve Beattie <email address hidden> Thu, 03 May 2018 12:45:47 -0700
-
intel-microcode (3.20180312.0~ubuntu14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: New upstream microcode data file 20180312 to provide
IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
- New Microcodes:
sig 0x00050653, pf mask 0x97, 2018-01-29, rev 0x1000140, size 30720
sig 0x00050665, pf mask 0x10, 2018-01-22, rev 0xe000009, size 18432
- Updated Microcodes:
sig 0x000206a7, pf mask 0x12, 2018-02-07, rev 0x002d, size 12288
sig 0x000206d6, pf mask 0x6d, 2018-01-30, rev 0x061c, size 18432
sig 0x000206d7, pf mask 0x6d, 2018-01-26, rev 0x0713, size 19456
sig 0x000306a9, pf mask 0x12, 2018-02-07, rev 0x001f, size 13312
sig 0x000306c3, pf mask 0x32, 2018-01-21, rev 0x0024, size 23552
sig 0x000306d4, pf mask 0xc0, 2018-01-18, rev 0x002a, size 18432
sig 0x000306e4, pf mask 0xed, 2018-01-25, rev 0x042c, size 15360
sig 0x000306e7, pf mask 0xed, 2018-02-16, rev 0x0713, size 16384
sig 0x000306f2, pf mask 0x6f, 2018-01-19, rev 0x003c, size 33792
sig 0x000306f4, pf mask 0x80, 2018-01-22, rev 0x0011, size 17408
sig 0x00040651, pf mask 0x72, 2018-01-18, rev 0x0023, size 21504
sig 0x00040661, pf mask 0x32, 2018-01-21, rev 0x0019, size 25600
sig 0x00040671, pf mask 0x22, 2018-01-21, rev 0x001d, size 12288
sig 0x000406e3, pf mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
sig 0x00050654, pf mask 0xb7, 2018-01-26, rev 0x2000043, size 28672
sig 0x00050662, pf mask 0x10, 2018-01-22, rev 0x0015, size 31744
sig 0x00050663, pf mask 0x10, 2018-01-22, rev 0x7000012, size 22528
sig 0x00050664, pf mask 0x10, 2018-01-22, rev 0xf000011, size 22528
sig 0x000506e3, pf mask 0x36, 2017-11-16, rev 0x00c2, size 99328
sig 0x000806e9, pf mask 0xc0, 2018-01-21, rev 0x0084, size 98304
sig 0x000806ea, pf mask 0xc0, 2018-01-21, rev 0x0084, size 97280
sig 0x000906e9, pf mask 0x2a, 2018-01-21, rev 0x0084, size 98304
sig 0x000906ea, pf mask 0x22, 2018-01-21, rev 0x0084, size 96256
sig 0x000906eb, pf mask 0x02, 2018-01-21, rev 0x0084, size 98304
- CVE-2017-5715
-- Tyler Hicks <email address hidden> Tue, 13 Mar 2018 20:10:18 +0000
-
intel-microcode (3.20180108.0+really20170707ubuntu14.04.1) trusty-security; urgency=medium
* Revert to 20170707 version of microcode because of regressions on
certain hardware. (LP: #1742933)
-- Marc Deslauriers <email address hidden> Mon, 22 Jan 2018 07:21:24 -0500
-
intel-microcode (3.20180108.0~ubuntu14.04.2) trusty-security; urgency=medium
* Sync package to xenial's latest update
* New upstream microcode datafile 20180108
+ New Microcodes:
sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384
sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280
sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304
+ Updated Microcodes:
sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552
sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432
sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360
sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792
sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408
sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528
sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600
sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312
sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648
sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744
sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528
sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328
sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304
* source: remove unneeded intel-ucode/ directory
* source: remove superseded upstream data file: 20170707
-- Marc Deslauriers <email address hidden> Tue, 09 Jan 2018 13:28:52 -0500
-
intel-microcode (2.20140913-t-1ubuntu1) trusty; urgency=medium
* Fixes for Haswell platforms
New upstream data file: microcode-20140913.dat
-LP: #1370352
-- Tim Gardner <email address hidden> Wed, 17 Sep 2014 09:40:33 -0600
-
intel-microcode (2.20140624-t-1ubuntu2) trusty; urgency=medium
* New upstream data file: microcode-20140624
-LP: #1335156
-- Tim Gardner <email address hidden> Fri, 27 Jun 2014 09:22:06 -0600
-
intel-microcode (2.20140430.1ubuntu1) trusty; urgency=medium
* A new CPU microcode release, 20140430 version was released and can be downloaded from:
https://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=23829
-LP: #1319114
-- Tim Gardner <email address hidden> Tue, 13 May 2014 11:50:12 -0600
-
intel-microcode (2.20140122.1) unstable; urgency=low
* New upstream microcode data file 20140122
+ New Microcodes:
sig 0x00040661, pf mask 0x32, 2013-08-21, rev 0x000f, size 23552
+ Updated Microcodes:
sig 0x000106e5, pf mask 0x13, 2013-08-20, rev 0x0007, size 7168
sig 0x000306c3, pf mask 0x32, 2013-08-16, rev 0x0017, size 20480
sig 0x000306e4, pf mask 0xed, 2013-07-09, rev 0x0416, size 11264
sig 0x00040651, pf mask 0x72, 2013-09-14, rev 0x0017, size 19456
-- Henrique de Moraes Holschuh <email address hidden> Sat, 01 Feb 2014 15:39:03 -0200
-
intel-microcode (1.20130906.1ubuntu3) trusty; urgency=medium
* Added microcode-20140122.dat
-LP: #1273532
-- Tim Gardner <email address hidden> Tue, 28 Jan 2014 13:37:23 +0000
-
intel-microcode (1.20130906.1ubuntu2) saucy; urgency=low
* Added microcode-20130906.dat
-LP: #1226911
-- Tim Gardner <email address hidden> Thu, 19 Sep 2013 13:40:26 -0600