intel-microcode (3.20190514.0ubuntu0.16.04.2) xenial-security; urgency=medium
* Update to final 20190514 microcode update. (LP: #1829745)
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
sig 0x00030678, pf_mask 0x02, 2016.04-22, rev 0x0838, size 52224
sig 0x00030678, pf_mask 0x0c, 2016.04-22, rev 0x0838, size 52224
sig 0x00030679, pf_mask 0x0f, 2016.04-23, rev 0x090c, size 52224
sig 0x000406c3, pf_mask 0x01, 2016.04-23, rev 0x0368, size 69632
sig 0x000406c4, pf_mask 0x01, 2016.04-23, rev 0x0411, size 68608
+ Add MDS mitigation support for Cherry Trail and Bay Trail
processor families.
[ Dimitri John Ledkov ]
* Do not override preset defaults from auto-exported conf snippets
loaded by initramfs-tools. This thus allows other hooks, or
alternative confdir override the built-in defaults at mkinitramfs
time. Specifically to support generating installer/golden/bare-metal
initrds with all microcodes for any hardware.
Date: 2019-05-22 07:35:14.103476+00:00
Changed-By: Steve Beattie <sbeat...@ubuntu.com>
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/intel-microcode/3.20190514.0ubuntu0.16.04.2
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes