intel-microcode (3.20190514.0ubuntu0.16.04.2) xenial-security; urgency=medium

  * Update to final 20190514 microcode update. (LP: #1829745)
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    + New Microcodes:
      sig 0x00030678, pf_mask 0x02, 2016.04-22, rev 0x0838, size 52224
      sig 0x00030678, pf_mask 0x0c, 2016.04-22, rev 0x0838, size 52224
      sig 0x00030679, pf_mask 0x0f, 2016.04-23, rev 0x090c, size 52224
      sig 0x000406c3, pf_mask 0x01, 2016.04-23, rev 0x0368, size 69632
      sig 0x000406c4, pf_mask 0x01, 2016.04-23, rev 0x0411, size 68608
    + Add MDS mitigation support for Cherry Trail and Bay Trail
      processor families.

  [ Dimitri John Ledkov ]
  * Do not override preset defaults from auto-exported conf snippets
    loaded by initramfs-tools. This thus allows other hooks, or
    alternative confdir override the built-in defaults at mkinitramfs
    time. Specifically to support generating installer/golden/bare-metal
    initrds with all microcodes for any hardware.

Date: 2019-05-22 07:35:14.103476+00:00
Changed-By: Steve Beattie <sbeat...@ubuntu.com>
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20190514.0ubuntu0.16.04.2
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to