Linux repositories inspector

intel-microcode - Processor microcode firmware for Intel CPUs

This package contains updated system processor microcode for Intel i686 and Intel X86-64 processors. Intel releases microcode updates to correct processor behavior as documented in the respective processor specification updates.
For AMD processors, please refer to the amd64-microcode package.
3.20180807a.2
Debian iconDebian 10.0
Debian iconDebian 9.0
MX Linux iconMX Linux mx15
MX Linux iconMX Linux stretch
Ubuntu iconUbuntu 19.04
3.20180807a.1
Ubuntu iconUbuntu 18.10
3.20180807a.0ubuntu0.18.04.1
Ubuntu iconUbuntu 18.04 LTS
3.20180807a.0ubuntu0.16.04.1
Ubuntu iconUbuntu 16.04 LTS
3.20180425.1
Ubuntu iconUbuntu 17.10
3.20180312.0
Ubuntu iconUbuntu 18.04 LTS
3.20170707.1
Ubuntu iconUbuntu 17.10
3.20151106.1
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/non-freedeb3.20180807a.212.01.20191.25 MiB1.58 MiB
Debian iconDebian 9.0 stretch/non-freedeb3.20180807a.2~deb9u116.02.20191.25 MiB1.58 MiB
Debian iconDebian 9.0 stretch-backports/non-freedeb3.20180807a.2~bpo9+112.01.20191.25 MiB1.58 MiB
MX Linux iconMX Linux mx15 mx15/non-freedeb3.20180807a.2~mx15+131.01.20191.25 MiB1.58 MiB
MX Linux iconMX Linux stretch stretch/non-freedeb3.20180807a.2~mx17+131.01.20191.25 MiB1.58 MiB
Ubuntu iconUbuntu 17.10 artful/restricteddeb3.20170707.110.11.2017964 kiB1.14 MiB
Ubuntu iconUbuntu 17.10 artful-proposed/maindeb3.20180425.1~ubuntu0.17.10.212.01.20191.09 MiB1.5 MiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb3.20180425.1~ubuntu0.17.10.112.06.20181.09 MiB1.5 MiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb3.20180425.1~ubuntu0.17.10.112.06.20181.09 MiB1.5 MiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb3.20180312.0~ubuntu18.04.114.03.20181.09 MiB1.49 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb3.20180807a.0ubuntu0.18.04.112.01.20191.22 MiB1.56 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb3.20180807a.0ubuntu0.18.04.112.01.20191.22 MiB1.56 MiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb3.20180807a.114.01.20191.22 MiB1.57 MiB
Ubuntu iconUbuntu 19.04 disco/maindeb3.20180807a.214.01.20191.23 MiB1.58 MiB
Ubuntu iconUbuntu 16.04 LTS xenial/restricteddeb3.20151106.110.11.2017454 kiB571 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb3.20180807a.0ubuntu0.16.04.112.01.20191.22 MiB1.56 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb3.20180807a.0ubuntu0.16.04.112.01.20191.22 MiB1.56 MiB

Latest updates

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/non-free: Version 3.20180807a.2~deb9u1 removed

16.02.2019 07:15
Debian 9.0 icon

Debian 9.0 stretch/non-free: Updated from 3.20180807a.1~deb9u1 to 3.20180807a.2~deb9u1

16.02.2019 06:42
  • Release managers:
    This update is being distributed by Debian in unstable, testing and jessie- and stretch-backports since 2018-10-30 without issues, and by most distros since 2018-08/2018-09, with no known reports of regressions on Westmere EP processors (Spectre mitigations are very expensive on Nehalem and Westmere, though).
  • SECURITY FIX: this update adds the accumulated fixes for Westmere EP (signature 0x206c2) from nearly a decade, including but likely not limited to:
    • Implements L1D_FLUSH support (L1TF "Foreshadow/-NG" mitigation) Intel SA-00161, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646
    • Implements SSBD support (Spectre v4 mitigation), Disable speculation for (some) RDMSR/WRMSR (Spectre v3a fix) Intel SA-00115, CVE-2018-3639, CVE-2018-3640
    • Implements IBRS/IBPB/STIPB support, Spectre v2 mitigation. Intel SA-0088, CVE-2017-5753, CVE-2017-5754
    • Very likely implements LAPIC sinkhole fix
    • Fixes AAK167/BT248: Virtual APIC accesses with 32-bit PAE paging may cause system crash
  • This Westmere EP microcode update has been explicitly approved by Intel for general distribution by operating systems, refer to the changelog entry for 3.20180807a.2 below
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/non-free: Version 3.20180807a.2~deb9u1 introduced

09.02.2019 22:30
  • Release managers:
    This update is being distributed by Debian in unstable, testing and jessie- and stretch-backports since 2018-10-30 without issues, and by most distros since 2018-08/2018-09, with no known reports of regressions on Westmere EP processors (Spectre mitigations are very expensive on Nehalem and Westmere, though).
  • SECURITY FIX: this update adds the accumulated fixes for Westmere EP (signature 0x206c2) from nearly a decade, including but likely not limited to:
    • Implements L1D_FLUSH support (L1TF "Foreshadow/-NG" mitigation) Intel SA-00161, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646
    • Implements SSBD support (Spectre v4 mitigation), Disable speculation for (some) RDMSR/WRMSR (Spectre v3a fix) Intel SA-00115, CVE-2018-3639, CVE-2018-3640
    • Implements IBRS/IBPB/STIPB support, Spectre v2 mitigation. Intel SA-0088, CVE-2017-5753, CVE-2017-5754
    • Very likely implements LAPIC sinkhole fix
    • Fixes AAK167/BT248: Virtual APIC accesses with 32-bit PAE paging may cause system crash
  • This Westmere EP microcode update has been explicitly approved by Intel for general distribution by operating systems, refer to the changelog entry for 3.20180807a.2 below
MX Linux stretch icon

MX Linux stretch stretch/non-free: Updated from 3.20180123really20171117.1+mx17 to 3.20180807a.2~mx17+1

31.01.2019 10:45
  • Rebuild for MX 17.
MX Linux mx15 icon

MX Linux mx15 mx15/non-free: Updated from 3.20180123really20171117.1+mx15 to 3.20180807a.2~mx15+1

31.01.2019 09:40
  • Rebuild for MX 15.
MX Linux stretch icon

MX Linux stretch stretch/non-free: Version 3.20180123really20171117.1+mx17 introduced

14.01.2019 15:01
  • Rollback Intel's problematic ucode updates
MX Linux mx15 icon

MX Linux mx15 mx15/non-free: Version 3.20180123really20171117.1+mx15 introduced

14.01.2019 14:59
  • Rebuild for MX-15/16
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Version 3.20180807a.2 introduced

14.01.2019 12:55
  • Makefile: unblacklist 0x206c2 (Westmere EP)
    According to , on message to LP#1795594 on 2018-10-09, we can ship 0x206c2 updates without restrictions. Also, there are no reports in the field about this update causing issues (closes: #907402) (LP: #1795594)
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic/main: Version 3.20180807a.1 introduced

14.01.2019 03:05
Henrique de Moraes Holschuh
  • New upstream microcode datafile 20180807a
    (closes: #906158, #906160, #903135, #903141)
    • New Microcodes:
      sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264 sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
    • Updated Microcodes:
      sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
    • Implements L1D_FLUSH support (L1TF "Foreshadow/-NG" mitigation) Intel SA-00161, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646
    • Implements SSBD support (Spectre v4 mitigation), Disable speculation for (some) RDMSR/WRMSR (Spectre v3a fix) Intel SA-00115, CVE-2018-3639, CVE-2018-3640
    • Implements IBRS/IBPB/STIPB support, Spectre v2 mitigation for older processors with signatures 0x106a5, 0x106e5, 0x20652, 0x20655. Intel SA-0088, CVE-2017-5753, CVE-2017-5754
  • source: update symlinks to reflect id of the latest release, 20180807a
  • debian/intel-microcode.docs: ship license and releasenote upstream files.
  • debian/changelog: update entry for 3.20180703.1 with L1TF information
Julian Andres Klode
  • initramfs: include all microcode for MODULES=most. Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738)
Debian 10.0 icon

Debian 10.0 buster/non-free: Updated from 3.20180108.1+really20171117.1 to 3.20180807a.2

12.01.2019 14:17
  • Makefile: unblacklist 0x206c2 (Westmere EP)
    According to , on message to LP#1795594 on 2018-10-09, we can ship 0x206c2 updates without restrictions. Also, there are no reports in the field about this update causing issues (closes: #907402) (LP: #1795594)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/non-free: Version 3.20180425.1~deb9u1 removed

12.01.2019 13:52
Debian 9.0 icon

Debian 9.0 stretch-backports/non-free: Updated from 3.20180425.1~bpo9+1 to 3.20180807a.2~bpo9+1

12.01.2019 13:52
  • Rebuild for stretch-backports (no changes)
Debian 9.0 icon

Debian 9.0 stretch/non-free: Updated from 3.20170707.1~deb9u1 to 3.20180807a.1~deb9u1

12.01.2019 13:50
  • Upload to Debian stretch (no changes)
  • Security fixes:
    Intel SA-00161, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646 Intel SA-00115, CVE-2018-3639, CVE-2018-3640
    Intel SA-00088, CVE-2017-5753, CVE-2017-5754
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 3.20180425.1~ubuntu0.18.04.1 to 3.20180807a.0ubuntu0.18.04.1

12.01.2019 13:44
  • SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646)
    • New Microcodes:
      sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
    • Updated Microcodes:
      sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
    • Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030:
      sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264
  • Remaining changes from Debian:
    • debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 3.20180425.1~ubuntu0.18.04.1 to 3.20180807a.0ubuntu0.18.04.1

12.01.2019 13:43
  • SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646)
    • New Microcodes:
      sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
    • Updated Microcodes:
      sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
    • Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030:
      sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264
  • Remaining changes from Debian:
    • debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
Ubuntu 17.10 icon

Ubuntu 17.10 artful-proposed/main: Version 3.20180425.1~ubuntu0.17.10.2 introduced

12.01.2019 13:43
  • Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config (LP: #1778738)
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 3.20180425.1~ubuntu0.16.04.1 to 3.20180807a.0ubuntu0.16.04.1

12.01.2019 13:42
  • SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646)
    • New Microcodes:
      sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
    • Updated Microcodes:
      sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
    • Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030:
      sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264
  • Remaining changes from Debian:
    • debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 3.20180425.1~ubuntu0.16.04.1 to 3.20180807a.0ubuntu0.16.04.1

12.01.2019 13:40
  • SECURITY UPDATE: New upstream microcode update to provide L1D cache flush support to mitigate L1TF (CVE-2018-3646)
    • New Microcodes:
      sig 0x000206e6, pf_mask 0x04, 2018-05-15, rev 0x000d, size 9216 sig 0x000506c2, pf_mask 0x01, 2018-05-11, rev 0x0014, size 15360 sig 0x000506ca, pf_mask 0x03, 2018-05-11, rev 0x000c, size 14336 sig 0x000506f1, pf_mask 0x01, 2018-05-11, rev 0x0024, size 10240
    • Updated Microcodes:
      sig 0x000106a5, pf_mask 0x03, 2018-05-11, rev 0x001d, size 12288 sig 0x000106e5, pf_mask 0x13, 2018-05-08, rev 0x000a, size 9216 sig 0x00020652, pf_mask 0x12, 2018-05-08, rev 0x0011, size 9216 sig 0x00020655, pf_mask 0x92, 2018-04-23, rev 0x0007, size 4096 sig 0x000206a7, pf_mask 0x12, 2018-04-10, rev 0x002e, size 12288 sig 0x000206f2, pf_mask 0x05, 2018-05-16, rev 0x003b, size 14336 sig 0x000306a9, pf_mask 0x12, 2018-04-10, rev 0x0020, size 13312 sig 0x000306c3, pf_mask 0x32, 2018-04-02, rev 0x0025, size 23552 sig 0x000306d4, pf_mask 0xc0, 2018-03-22, rev 0x002b, size 18432 sig 0x00040651, pf_mask 0x72, 2018-04-02, rev 0x0024, size 22528 sig 0x00040661, pf_mask 0x32, 2018-04-02, rev 0x001a, size 25600 sig 0x00040671, pf_mask 0x22, 2018-04-03, rev 0x001e, size 13312 sig 0x000406e3, pf_mask 0xc0, 2018-04-17, rev 0x00c6, size 99328 sig 0x00050662, pf_mask 0x10, 2018-05-25, rev 0x0017, size 31744 sig 0x00050663, pf_mask 0x10, 2018-04-20, rev 0x7000013, size 22528 sig 0x00050664, pf_mask 0x10, 2018-04-20, rev 0xf000012, size 22528 sig 0x000506c9, pf_mask 0x03, 2018-05-11, rev 0x0032, size 16384 sig 0x000506e3, pf_mask 0x36, 2018-04-17, rev 0x00c6, size 99328 sig 0x000706a1, pf_mask 0x01, 2018-05-22, rev 0x0028, size 73728 sig 0x000806e9, pf_mask 0xc0, 2018-03-24, rev 0x008e, size 98304 sig 0x000806ea, pf_mask 0xc0, 2018-05-15, rev 0x0096, size 98304 sig 0x000906e9, pf_mask 0x2a, 2018-03-24, rev 0x008e, size 98304 sig 0x000906ea, pf_mask 0x22, 2018-05-02, rev 0x0096, size 97280 sig 0x000906eb, pf_mask 0x02, 2018-03-24, rev 0x008e, size 98304
    • Added back upstream but blacklisted by packaging due to the issues around addressing Intel SA-00030:
      sig 0x000206c2, pf_mask 0x03, 2018-05-08, rev 0x001f, size 11264
  • Remaining changes from Debian:
    • debian/initramfs.hook: Default to early instead of auto, and install all of the microcode, not just the one matching the current CPU, if MODULES=most is set in the initramfs-tools config
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/non-free: Version 3.20180425.1~deb9u1 introduced

19.06.2018 07:50
Debian 9.0 icon

Debian 9.0 stretch-backports/non-free: Updated from 3.20171117.1~bpo9+1 to 3.20180425.1~bpo9+1

19.06.2018 07:50
⇧ Top