amd64-microcode (3.20180524.1~ubuntu0.17.10.1) artful-security; urgency=medium
* SECURITY UPDATE: Add Spectre Variant 2 protection for family 17h AMD
processors (CVE-2017-5715)
- Backport to artful.
amd64-microcode (3.20180524.1) unstable; urgency=high
* New microcode update packages from AMD upstream:
+ Re-added Microcodes:
sig 0x00610f01, patch id 0x06001119, 2012-07-13
* This update avoids regressing sig 0x610f01 processors on systems with
outdated firmware by adding back exactly the same microcode patch that was
present before [for these processors]. It does not implement Spectre-v2
mitigation for these processors.
* README: update for new release
amd64-microcode (3.20180515.1) unstable; urgency=high
* New microcode update packages from AMD upstream:
+ New Microcodes:
sig 0x00800f12, patch id 0x08001227, 2018-02-09
+ Updated Microcodes:
sig 0x00600f12, patch id 0x0600063e, 2018-02-07
sig 0x00600f20, patch id 0x06000852, 2018-02-06
+ Removed Microcodes:
sig 0x00610f01, patch id 0x06001119, 2012-07-13
* Adds Spectre v2 (CVE-2017-5715) microcode-based mitigation support,
plus other unspecified fixes/updates.
* README, debian/copyright: update for new release
amd64-microcode (3.20171205.2) unstable; urgency=medium
* debian/control: update Vcs-* fields for salsa.debian.org
amd64-microcode (3.20171205.1) unstable; urgency=high
* New microcode updates (closes: #886382):
sig 0x00800f12, patch id 0x08001213, 2017-12-05
Thanks to SuSE for distributing these ahead of AMD's official release!
* Add IBPB support for family 17h AMD processors (CVE-2017-5715)
* README: describe source for faml17h microcode update
* Upload to unstable to match IBPB microcode support on Intel in Debian
unstable.
* WARNING: requires at least kernel 4.15, 4.14.13, 4.9.76, 4.4.111 (or a
backport of commit f4e9b7af0cd58dd039a0fb2cd67d57cea4889abf
"x86/microcode/AMD: Add support for fam17h microcode loading") otherwise
it will not be applied to the processor.
-- Steve Beattie <email address hidden> Tue, 29 May 2018 15:16:39 -0700