-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 07 Aug 2016 21:48:59 -0300 Source: intel-microcode Binary: intel-microcode Architecture: amd64 i386 source Version: 3.20160714.1~deb8u1 Distribution: stable Urgency: medium Maintainer: Henrique de Moraes Holschuh <hmh@debian.org> Changed-By: Henrique de Moraes Holschuh <hmh@debian.org> Closes: 814301 828819 Description: intel-microcode - Processor microcode firmware for Intel CPUs Changes: intel-microcode (3.20160714.1~deb8u1) stable; urgency=medium . * Rebuild for Debian jessie stable update (no changes) * STABLE RELEASE MANAGER INFORMATION: + This is the same package which is in unstable since 2016-07-22, and stretch (testing) and jessie-backports since 2016-07-28, with no issues reported + Contains updated microcode for: Skylake/H/DT, Broadwell/E/EP/H/DE/WS, Haswell/E/WS/EP/EX, and their usual variants (U/ULT,Y,S...): mobile, desktop, embedded, single- and dual-socket server/workstation. Also includes related Pentium and Celeron + Somewhat unusually, this release includes an update for the multi-socket Haswell-EX E7-v3 Xeon server processors + Fixes critical issues on Intel Skylake processors, such as: - TSX unpredictable behavior - AVX data/calculation corruption - High-hitting crashes and hangs related to MCEs and power management errata that might make it impossible to even install Debian in the first place (systems with very outdated firmware) + Likely fixes a recently identified, critical but low-hitting TSX erratum on Broadwell, Broadwell-E and related Xeons (Broadwell-DE/WS/EP: Xeon-D 1500, E3-v4 and E5-v4) + Fix Broadwell-DE (Xeon-D 1500) errata (incomplete list): Stepping V-1: BDE58, BDE56, BDE55, BDE50, BDE44, BDE41, BDE38, BDE10, BDE9, BDE8, BDE7 Stepping Y-0: LAN1, BDE67, BDE68 + Might fix Haswell-EP Xeon E5-v3 power management regression which is already present in the packages currently in jessie (#815990) + Fixes undisclosed errata on Xeon E7-v3 48xx/88xx . intel-microcode (3.20160714.1~bpo8+1) jessie-backports; urgency=medium . * Rebuild for jessie-backports (no changes) . intel-microcode (3.20160714.1) unstable; urgency=medium . * New upstream microcode datafile 20160714 + Updated Microcodes: sig 0x000306f4, pf mask 0x80, 2016-06-07, rev 0x000d, size 15360 sig 0x000406e3, pf mask 0xc0, 2016-06-22, rev 0x009e, size 97280 sig 0x000406f1, pf mask 0xef, 2016-06-06, rev 0xb00001d, size 25600 sig 0x000506e3, pf mask 0x36, 2016-06-22, rev 0x009e, size 97280 + This release hopefully fixes a hang when updating the microcode on some Skylake-U D-1/Skylake-Y D-1 (sig 0x406e3, pf 0x80) systems * source: remove superseded upstream data file: 20160607 . intel-microcode (3.20160607.2~bpo8+1) jessie-backports; urgency=medium . * Rebuild for jessie-backports (no changes) . intel-microcode (3.20160607.2) unstable; urgency=low . * REMOVE microcode: sig 0x000406e3, pf mask 0xc0, 2016-04-06, rev 0x008a, size 96256 (closes: #828819) * The Core i7-6500U and m3-6Y30 processors (Skylake-UY D-1, sig=0x406e3, pf=0x80) may hang while attempting an early microcode update to revision 0x8a, apparently due to some sort of firmware dependency. On affected systems, the only way to avoid the issue is to get a firmware update that includes microcode revision 0x8a or later. At this time, there are reports of both sucessful and failed updates on the m3-6Y30, and only of failed updates on the i7-6500U. There are no reports about Skylake-U K-1 (pf=0x40). + WARNING: it is unsafe to use a system based on an Intel Skylake-U/Y processor with microcode earlier than revision 0x8a, due to several critical errata that cause unpredictable behavior, data corruption, and other problems. Users *must* update their firmware to get microcode 0x8a or newer, and keep it up-to-date. . intel-microcode (3.20160607.1~bpo8+1) jessie-backports; urgency=medium . * Rebuild for jessie-backports (no changes) . intel-microcode (3.20160607.1) unstable; urgency=medium . * New upstream microcode data file 20160607 + New Microcodes: sig 0x000406e3, pf mask 0xc0, 2016-04-06, rev 0x008a, size 96256 sig 0x000406f1, pf mask 0xef, 2016-05-20, rev 0xb00001c, size 25600 sig 0x00050662, pf mask 0x10, 2015-12-12, rev 0x000f, size 28672 sig 0x000506e3, pf mask 0x36, 2016-04-06, rev 0x008a, size 96256 + Updated Microcodes: sig 0x000306c3, pf mask 0x32, 2016-03-16, rev 0x0020, size 22528 sig 0x000306d4, pf mask 0xc0, 2016-04-29, rev 0x0024, size 17408 sig 0x000306f2, pf mask 0x6f, 2016-03-28, rev 0x0038, size 32768 sig 0x000306f4, pf mask 0x80, 2016-02-11, rev 0x000a, size 15360 sig 0x00040651, pf mask 0x72, 2016-04-01, rev 0x001f, size 20480 sig 0x00040661, pf mask 0x32, 2016-04-01, rev 0x0016, size 24576 sig 0x00040671, pf mask 0x22, 2016-04-29, rev 0x0016, size 11264 * source: remove superseded upstream data file: 20151106. * control: change upstream URL to a search for "linux microcode" Unfortunately, many of the per-processor-model feeds have not been updated for microcode release 20160607. Switch to the general search page as the upstream URL. * README.Debian: fix duplicated word 'to' . intel-microcode (3.20151106.2) unstable; urgency=medium . * Makefile: make the build less verbose. * debian/changelog: fix error in past entry. Correct the version of the microcode that caused bug #776431, in the entry for version 3.20150121.1. * initramfs: don't force_load microcode.ko when missing. Detect a missing microcode.ko and don't attempt to force_load() it, otherwise we get spurious warnings at boot. In verbose mode, log the fact that the microcode driver is modular. For Linux 4.4 and later, skip the entire module loading logic, since the microcode driver cannot be modular for those kernels (closes: #814301). * initramfs: update copyright notice * initramfs: use iucode_tool -l for verbose mode * README.Debian: enhance and add recovery instructions. Rewrite large parts of the README.Debian document, and add recovery instructions (use of the "dis_ucode_ldr" kernel parameter). . intel-microcode (3.20151106.1~bpo8+1) jessie-backports; urgency=medium . * Rebuild for jessie-backports (no changes) Checksums-Sha1: edd31c2e5243c980c17d830644dc29076da1d9fa 1811 intel-microcode_3.20160714.1~deb8u1.dsc d411975502d2b5cecbfaa3764b0e8a99efe12643 1153284 intel-microcode_3.20160714.1~deb8u1.tar.xz 570aa8693660a6f287a452343206499415dbefee 660376 intel-microcode_3.20160714.1~deb8u1_amd64.deb 350404858f087cc684c9f69d2fd883926bdb516b 801078 intel-microcode_3.20160714.1~deb8u1_i386.deb Checksums-Sha256: 7f0502e519576ca4b05c70d37fc3aebf61add249fa2d74f5b37fccf800cd9c91 1811 intel-microcode_3.20160714.1~deb8u1.dsc 72a8df6cddc54f52f667075e97f972485ffcab3ade44f3f1cc9f363802957f0d 1153284 intel-microcode_3.20160714.1~deb8u1.tar.xz e0a6ee685593aa5c5d667df909d340f48947e9d94640fe18cf9b12a5177ce921 660376 intel-microcode_3.20160714.1~deb8u1_amd64.deb d8abe6c4f10fa02b97c2a1adbb7d7728cf37cbf9e1e6ae91db62800837cbb1b2 801078 intel-microcode_3.20160714.1~deb8u1_i386.deb Files: 748d587994fa42963bc04dd97748b2c2 1811 non-free/admin standard intel-microcode_3.20160714.1~deb8u1.dsc d709a66b67e9052b0bc3143fc483d23f 1153284 non-free/admin standard intel-microcode_3.20160714.1~deb8u1.tar.xz f82d9d61743f863ae835a04195eecb1b 660376 non-free/admin standard intel-microcode_3.20160714.1~deb8u1_amd64.deb 79b6b51479db0382f1e4225daf2a7f42 801078 non-free/admin standard intel-microcode_3.20160714.1~deb8u1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXp9rlAAoJEP4Rv6aLFY6YXJ0P/jX8DCbvTUiWNA9l9jjeI9zp lxZgoMbzfVTCMAYP9gajTMg/gYeTPricWC7swPDSZaWKeWAa7X5vnVhMdv5p8A8Z OQo0e7OaWJc7xHFDXwradzxnCtxwSy7sOQhRZFDlwlYvaR5T24PVG/mzqTdjAL+v r9on4UJP0ufBI9i2r1Z96RykZjUH1j794Nb/OsLdElLzzt1TuXmUWqLnt+5fdcJi 9MaxOatw+mZu1SD8ELwkSyqyRIopyx4dXsiyG5KcjzatSB5ZQQsUwXID/CT8YDjm 6VLmgxQHQ4vqvKs1yz/2/x6mP9s9XB6UffXedBaj+j7kwi6vC3bOB0hEeGQESnyP kvkUUQKxTcM1odpDw283nFWgmxvPsiO8cqN60i0Y7gilcjCBF6/qpiUQ6ew18bBJ Lzj0XRUEWv/VeGhKyH/l0CEcql8MvELuc4qZF8TLqh4nCrho58e66NmWuV7cBOfr cQ4Q8PDFIX+MSIrxyn1iqtnE9JnGzhE21ykh257kvRke0k3Pq9TbQc2+v93pJnP3 +5oGl2b7adT3yBM8WvModUQnItbKyo9Ee5PE4UhU/SrKgJa/GytI8JrHvgYlFgoB waAJh60AjgVlpRHnxD4l5D7uzTuWDR0cCZjpgm/UdcYQbNLnr3OxvfLJ6WBUW9ms t5Z/NtS6UneAuTZgmi1S =bbz5 -----END PGP SIGNATURE-----