intel-microcode (3.20180425.1~ubuntu0.16.04.1) xenial-security; urgency=medium
* SECURITY UPDATE: New upstream microcode data file 20180425 to
provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
- merge from Debian.
intel-microcode (3.20180425.1) unstable; urgency=medium
* New upstream microcode data file 20180425 (closes: #897443, #895878)
+ Updated Microcodes:
sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
+ Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
+ Note that sig 0x000604f1 has been blacklisted from late-loading
since Debian release 3.20171117.1.
* source: remove undesired list files from microcode directories
* source: switch to microcode-<id>.d/ since Intel dropped .dat
support.
Date: 2018-05-04 07:46:12.103188+00:00
Changed-By: Steve Beattie <sbeat...@ubuntu.com>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20180425.1~ubuntu0.16.04.1
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes