ubuntu/+source/amd64-microcode:applied/ubuntu/trusty-devel

Last commit made on 2018-08-13
Get this branch:
git clone -b applied/ubuntu/trusty-devel https://git.launchpad.net/ubuntu/+source/amd64-microcode
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/ubuntu/trusty-devel
Repository:
lp:ubuntu/+source/amd64-microcode

Recent commits

92802d5... by Julian Andres Klode on 2018-08-07

Import patches-applied version 3.20180524.1~ubuntu0.14.04.2+really20130710.1ubuntu1 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 4c96ec553e4d12b1e39a4407d35dcae17c9c0a4b
Unapplied parent: b3f4da8c9164ef60c390474f24274ba9e37b65d8

New changelog entries:
  * Install (all) microcode on non-amd systems too if MODULES=most in initramfs-tools
    config (LP: #1778738)

b3f4da8... by Julian Andres Klode on 2018-08-07

Import patches-unapplied version 3.20180524.1~ubuntu0.14.04.2+really20130710.1ubuntu1 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 66ef27b13812832961c36a02e6e23d990e1d6c01

New changelog entries:
  * Install (all) microcode on non-amd systems too if MODULES=most in initramfs-tools
    config (LP: #1778738)

4c96ec5... by Steve Beattie on 2018-07-03

Import patches-applied version 3.20180524.1~ubuntu0.14.04.2+really20130710.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 718707d0a7d56fac58806a49198fff1651706f31
Unapplied parent: 66ef27b13812832961c36a02e6e23d990e1d6c01

New changelog entries:
  * REGRESSION UPDATE: revert to 2.20131007.1+really20130710.1 due to
    3.20180524.1~ubuntu0.14.04.1 causing boot looping for some AMD
    processors (LP: #1779092)

66ef27b... by Steve Beattie on 2018-07-03

Import patches-unapplied version 3.20180524.1~ubuntu0.14.04.2+really20130710.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cfa94c4ea64cf85e8548e6260b156fcb45a71b33

New changelog entries:
  * REGRESSION UPDATE: revert to 2.20131007.1+really20130710.1 due to
    3.20180524.1~ubuntu0.14.04.1 causing boot looping for some AMD
    processors (LP: #1779092)

718707d... by Steve Beattie on 2018-05-29

Import patches-applied version 3.20180524.1~ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: fa529a15eb5cd85385e8bde885bbdf4d0cab504b
Unapplied parent: cfa94c4ea64cf85e8548e6260b156fcb45a71b33

New changelog entries:
  * SECURITY UPDATE: Add Spectre Variant 2 protection for family 17h AMD
    processors (CVE-2017-5715)
    - Backport to xenial.
    - debian/initramfs.hook: support for amd64 early loading has been
      backported to 3.13 in Ubuntu, so only block kernels before that.
    - debian/control: early initramfs loading of microcode was added in
      initramfs-tools 0.103ubuntu4 for trusty, so recommend that version
      or later

cfa94c4... by Steve Beattie on 2018-05-29

Import patches-unapplied version 3.20180524.1~ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: a02782d21489bf04ff0d5c145741537f62e4525e

New changelog entries:
  * SECURITY UPDATE: Add Spectre Variant 2 protection for family 17h AMD
    processors (CVE-2017-5715)
    - Backport to xenial.
    - debian/initramfs.hook: support for amd64 early loading has been
      backported to 3.13 in Ubuntu, so only block kernels before that.
    - debian/control: early initramfs loading of microcode was added in
      initramfs-tools 0.103ubuntu4 for trusty, so recommend that version
      or later

fa529a1... by Henrique de Moraes Holschuh on 2018-05-25

Import patches-applied version 3.20180524.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4856f71a24332e78d0d1779b25d277a78b950dd2
Unapplied parent: a02782d21489bf04ff0d5c145741537f62e4525e

New changelog entries:
  * New microcode update packages from AMD upstream:
    + Re-added Microcodes:
      sig 0x00610f01, patch id 0x06001119, 2012-07-13
  * This update avoids regressing sig 0x610f01 processors on systems with
    outdated firmware by adding back exactly the same microcode patch that was
    present before [for these processors]. It does not implement Spectre-v2
    mitigation for these processors.
  * README: update for new release

a02782d... by Henrique de Moraes Holschuh on 2018-05-25

Import patches-unapplied version 3.20180524.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 811c3b7ac4130238a8a5189a69c709ed804ff09a

New changelog entries:
  * New microcode update packages from AMD upstream:
    + Re-added Microcodes:
      sig 0x00610f01, patch id 0x06001119, 2012-07-13
  * This update avoids regressing sig 0x610f01 processors on systems with
    outdated firmware by adding back exactly the same microcode patch that was
    present before [for these processors]. It does not implement Spectre-v2
    mitigation for these processors.
  * README: update for new release

4856f71... by Henrique de Moraes Holschuh on 2018-05-19

Import patches-applied version 3.20180515.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 24be426856fab4ea6d02695cc3b005a43ffbe16a
Unapplied parent: 811c3b7ac4130238a8a5189a69c709ed804ff09a

New changelog entries:
  * New microcode update packages from AMD upstream:
    + New Microcodes:
      sig 0x00800f12, patch id 0x08001227, 2018-02-09
    + Updated Microcodes:
      sig 0x00600f12, patch id 0x0600063e, 2018-02-07
      sig 0x00600f20, patch id 0x06000852, 2018-02-06
    + Removed Microcodes:
      sig 0x00610f01, patch id 0x06001119, 2012-07-13
  * Adds Spectre v2 (CVE-2017-5715) microcode-based mitigation support,
    plus other unspecified fixes/updates.
  * README, debian/copyright: update for new release

811c3b7... by Henrique de Moraes Holschuh on 2018-05-19

Import patches-unapplied version 3.20180515.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: bd768caf7a12937fe1d54d68f836b1bdabaf96a0

New changelog entries:
  * New microcode update packages from AMD upstream:
    + New Microcodes:
      sig 0x00800f12, patch id 0x08001227, 2018-02-09
    + Updated Microcodes:
      sig 0x00600f12, patch id 0x0600063e, 2018-02-07
      sig 0x00600f20, patch id 0x06000852, 2018-02-06
    + Removed Microcodes:
      sig 0x00610f01, patch id 0x06001119, 2012-07-13
  * Adds Spectre v2 (CVE-2017-5715) microcode-based mitigation support,
    plus other unspecified fixes/updates.
  * README, debian/copyright: update for new release