Your message dated Tue, 12 Jun 2018 22:03:55 +0000
with message-id <e1fsron-0008ym...@fasolo.debian.org>
and subject line Bug#886367: fixed in intel-microcode 3.20180425.1~deb9u1
has caused the Debian Bug report #886367,
regarding intel-microcode: spectre microcode updates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
886367: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886367
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: intel-microcode
Version: 3.20171117.1
Severity: grave

It's been rumored that Intel will be releasing microcode updates to (partially?) mitigate some of the effects of meltdown and spectre. It appears that the latest version on the website is still 20171117.

Any news of what this will be and when it will happen?

Thanks,

--
Matt Taggart
tagg...@debian.org

--- End Message ---
--- Begin Message ---
Source: intel-microcode
Source-Version: 3.20180425.1~deb9u1

We believe that the bug you reported is fixed in the latest version of
intel-microcode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 886...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <h...@debian.org> (supplier of updated 
intel-microcode package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 18 May 2018 09:15:59 -0300
Source: intel-microcode
Binary: intel-microcode
Architecture: amd64 i386 source
Version: 3.20180425.1~deb9u1
Distribution: stretch
Urgency: critical
Maintainer: Henrique de Moraes Holschuh <h...@debian.org>
Changed-By: Henrique de Moraes Holschuh <h...@debian.org>
Closes: 886367 886368 886998 895878 897443
Description: 
 intel-microcode - Processor microcode firmware for Intel CPUs
Changes:
 intel-microcode (3.20180425.1~deb9u1) stretch; urgency=medium
 .
   * Upload to Debian stretch (no changes)
   * RELEASE MANAGER INFORMATION: This update deploys the microcode side fix
     for CVE-2017-5715 (Spectre v2).  On the more recent processors, it also
     fixes other unspecified errata.  This microcode update pack has been
     extensively tested in Debian unstable, testing, strech-backports and
     jessie-backports.  It has been extensively deployed by other distributions
     to their stable branches without causing any issues, with one notable
     exception (a distro-specific kernel bug, already fixed by that distro).
 .
 intel-microcode (3.20180425.1) unstable; urgency=medium
 .
   * New upstream microcode data file 20180425 (closes: #897443, #895878)
     + Updated Microcodes:
       sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
       sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
     + Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
     + Note that sig 0x000604f1 has been blacklisted from late-loading
       since Debian release 3.20171117.1.
   * source: remove undesired list files from microcode directories
   * source: switch to microcode-<id>.d/ since Intel dropped .dat
     support.
 .
 intel-microcode (3.20180312.1) unstable; urgency=medium
 .
   * New upstream microcode data file 20180312 (closes: #886367)
     + New Microcodes:
       sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720
       sig 0x00050665, pf_mask 0x10, 2018-01-22, rev 0xe000009, size 18432
     + Updated Microcodes:
       sig 0x000206a7, pf_mask 0x12, 2018-02-07, rev 0x002d, size 12288
       sig 0x000206d6, pf_mask 0x6d, 2018-01-30, rev 0x061c, size 18432
       sig 0x000206d7, pf_mask 0x6d, 2018-01-26, rev 0x0713, size 19456
       sig 0x000306a9, pf_mask 0x12, 2018-02-07, rev 0x001f, size 13312
       sig 0x000306c3, pf_mask 0x32, 2018-01-21, rev 0x0024, size 23552
       sig 0x000306d4, pf_mask 0xc0, 2018-01-18, rev 0x002a, size 18432
       sig 0x000306e4, pf_mask 0xed, 2018-01-25, rev 0x042c, size 15360
       sig 0x000306e7, pf_mask 0xed, 2018-02-16, rev 0x0713, size 16384
       sig 0x000306f2, pf_mask 0x6f, 2018-01-19, rev 0x003c, size 33792
       sig 0x000306f4, pf_mask 0x80, 2018-01-22, rev 0x0011, size 17408
       sig 0x00040651, pf_mask 0x72, 2018-01-18, rev 0x0023, size 21504
       sig 0x00040661, pf_mask 0x32, 2018-01-21, rev 0x0019, size 25600
       sig 0x00040671, pf_mask 0x22, 2018-01-21, rev 0x001d, size 12288
       sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
       sig 0x00050654, pf_mask 0xb7, 2018-01-26, rev 0x2000043, size 28672
       sig 0x00050662, pf_mask 0x10, 2018-01-22, rev 0x0015, size 31744
       sig 0x00050663, pf_mask 0x10, 2018-01-22, rev 0x7000012, size 22528
       sig 0x00050664, pf_mask 0x10, 2018-01-22, rev 0xf000011, size 22528
       sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328
       sig 0x000806e9, pf_mask 0xc0, 2018-01-21, rev 0x0084, size 98304
       sig 0x000806ea, pf_mask 0xc0, 2018-01-21, rev 0x0084, size 97280
       sig 0x000906e9, pf_mask 0x2a, 2018-01-21, rev 0x0084, size 98304
       sig 0x000906ea, pf_mask 0x22, 2018-01-21, rev 0x0084, size 96256
       sig 0x000906eb, pf_mask 0x02, 2018-01-21, rev 0x0084, size 98304
     + Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation for:
       Sandybridge, Ivy Bridge, Haswell, Broadwell, Skylake, Kaby Lake,
       Coffee Lake
     + Missing production updates:
       + Broadwell-E/EX Xeons (sig 0x406f1)
       + Anniedale/Morefield, Apollo Lake, Avoton, Cherry Trail, Braswell,
         Gemini Lake, Denverton
   * Update past changelog entries with new information:
     Intel already had all necessary semanthics in LFENCE, so the
     Spectre-related Intel microcode changes did not need to enhance LFENCE.
   * debian/control: update Vcs-* fields for the move to salsa.debian.org
 .
 intel-microcode (3.20180108.1+really20171117.1) unstable; urgency=critical
 .
   * Revert to release 20171117, as per Intel instructions issued to
     the public in 2018-01-22 (closes: #886998)
   * This effectively removes IBRS/IBPB/STIPB microcode support for
     Spectre variant 2 mitigation.
 .
 intel-microcode (3.20180108.1) unstable; urgency=high
 .
   * New upstream microcode data file 20180108 (closes: #886367)
     + Updated Microcodes:
       sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552
       sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432
       sig 0x000306e4, pf_mask 0xed, 2017-12-01, rev 0x042a, size 15360
       sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792
       sig 0x000306f4, pf_mask 0x80, 2017-11-17, rev 0x0010, size 17408
       sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528
       sig 0x00040661, pf_mask 0x32, 2017-11-20, rev 0x0018, size 25600
       sig 0x00040671, pf_mask 0x22, 2017-11-17, rev 0x001b, size 13312
       sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
       sig 0x00050654, pf_mask 0xb7, 2017-12-08, rev 0x200003c, size 27648
       sig 0x00050662, pf_mask 0x10, 2017-12-16, rev 0x0014, size 31744
       sig 0x00050663, pf_mask 0x10, 2017-12-16, rev 0x7000011, size 22528
       sig 0x000506e3, pf_mask 0x36, 2017-11-16, rev 0x00c2, size 99328
       sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
       sig 0x000806e9, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
       sig 0x000806ea, pf_mask 0xc0, 2018-01-04, rev 0x0080, size 98304
       sig 0x000906e9, pf_mask 0x2a, 2018-01-04, rev 0x0080, size 98304
       sig 0x000906ea, pf_mask 0x22, 2018-01-04, rev 0x0080, size 97280
       sig 0x000906eb, pf_mask 0x02, 2018-01-04, rev 0x0080, size 98304
     + Implements IBRS/IBPB support: mitigation against Spectre (CVE-2017-5715)
     + Very likely fixes several other errata on some of the processors
   * supplementary-ucode-CVE-2017-5715.d/: remove.
     + Downgraded microcodes:
       sig 0x000406f1, pf_mask 0xef, 2017-03-01, rev 0xb000021, size 26624
       sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384
     + Recall related to bug #886998
   * source: remove superseded upstream data file: 20171117
   * README.Debian, copyright: update download URLs (closes: #886368)
 .
 intel-microcode (3.20171215.1) unstable; urgency=high
 .
   * Add supplementary-ucode-CVE-2017-5715.d/: (closes: #886367)
     New upstream microcodes to partially address CVE-2017-5715
     + Updated Microcodes:
       sig 0x000306c3, pf_mask 0x32, 2017-11-20, rev 0x0023, size 23552
       sig 0x000306d4, pf_mask 0xc0, 2017-11-17, rev 0x0028, size 18432
       sig 0x000306f2, pf_mask 0x6f, 2017-11-17, rev 0x003b, size 33792
       sig 0x00040651, pf_mask 0x72, 2017-11-20, rev 0x0021, size 22528
       sig 0x000406e3, pf_mask 0xc0, 2017-11-16, rev 0x00c2, size 99328
       sig 0x000406f1, pf_mask 0xef, 2017-11-18, rev 0xb000025, size 27648
       sig 0x00050654, pf_mask 0xb7, 2017-11-21, rev 0x200003a, size 27648
       sig 0x000506c9, pf_mask 0x03, 2017-11-22, rev 0x002e, size 16384
       sig 0x000806e9, pf_mask 0xc0, 2017-12-03, rev 0x007c, size 98304
       sig 0x000906e9, pf_mask 0x2a, 2017-12-03, rev 0x007c, size 98304
   * Implements IBRS and IBPB support via new MSR (Spectre variant 2
     mitigation, indirect branches).  Support is exposed through cpuid(7).EDX.
 .
 intel-microcode (3.20171117.1) unstable; urgency=medium
 .
   * New upstream microcode data file 20171117
     + New Microcodes:
       sig 0x000506c9, pf_mask 0x03, 2017-03-25, rev 0x002c, size 16384
       sig 0x000706a1, pf_mask 0x01, 2017-10-31, rev 0x001e, size 72704
       sig 0x000906ea, pf_mask 0x22, 2017-08-23, rev 0x0070, size 95232
       sig 0x000906eb, pf_mask 0x02, 2017-09-20, rev 0x0072, size 97280
     + Updated Microcodes:
       sig 0x00050654, pf_mask 0xb7, 2017-10-17, rev 0x2000035, size 26624
       sig 0x000806ea, pf_mask 0xc0, 2017-08-03, rev 0x0070, size 96256
   * source: remove superseded upstream data file: 20170707.
   * source: remove unneeded intel-ucode/ directory for 20171117.
   * debian/control: bump standards version to 4.1.1 (no changes)
   * Makefile: rename microcode-extras.pbin to microcode-includes.pbin.
   * README.source: fix IUC_EXCLUDE example and minor issues.
   * Makefile, README.souce: support loading ucode from directories.
   * debian/rules: switch to dh mode (debhelper v9)
   * ucode-blacklist: blacklist sig 0x406f1 (Skylake-X H0) from late
     loading.
Checksums-Sha1: 
 cc6377a6218eee4aa61de9aabbe83eb3d5415f80 1813 
intel-microcode_3.20180425.1~deb9u1.dsc
 fc8a0319bc7f7b3f60dd5b026d8e27faa25efd97 1828908 
intel-microcode_3.20180425.1~deb9u1.tar.xz
 da540ffdd621fc7b4d13b7ae193c84518c753b37 5946 
intel-microcode_3.20180425.1~deb9u1_amd64.buildinfo
 b2a39291e74724cba14086440e169ccc459c9535 1158186 
intel-microcode_3.20180425.1~deb9u1_amd64.deb
 425e4e2483571113bd6c18148ce589130f7f76d5 4712 
intel-microcode_3.20180425.1~deb9u1_i386.buildinfo
 96d1aebb43f00563c9b1e5c347fdaf9274f39146 1300084 
intel-microcode_3.20180425.1~deb9u1_i386.deb
Checksums-Sha256: 
 0576ace38f4fd06c854fd5eb26f42029e8c3d9637263c0f681c0dbf211e7ccd6 1813 
intel-microcode_3.20180425.1~deb9u1.dsc
 ebb5ab068560a24c3773e4890fc0e245bbe6aef3bd6af541bca5ff9efb5a3556 1828908 
intel-microcode_3.20180425.1~deb9u1.tar.xz
 f580e1343f98946bf201de3cf2ae62672e69522bcef199ff81691e58a539252f 5946 
intel-microcode_3.20180425.1~deb9u1_amd64.buildinfo
 fe79bc5bc8c8673e2a6f9311be78649d5b88894d0b8a8368ea03a62359bc7ba0 1158186 
intel-microcode_3.20180425.1~deb9u1_amd64.deb
 d1f78b0c68df362253d2d78e5f615adaee91adc4fe2ba2830f11d8274ce86911 4712 
intel-microcode_3.20180425.1~deb9u1_i386.buildinfo
 bbbec1c3931916827c81c925bc6f8dd56f1ae177f09ac0fef1c8aac8a551aac5 1300084 
intel-microcode_3.20180425.1~deb9u1_i386.deb
Files: 
 4f297423cf3e38efb6cdcbd8feada267 1813 non-free/admin standard 
intel-microcode_3.20180425.1~deb9u1.dsc
 3cedd06c480d8dd4305aa8dff12b508b 1828908 non-free/admin standard 
intel-microcode_3.20180425.1~deb9u1.tar.xz
 15034d6bf8a853432307abcf0be7ed00 5946 non-free/admin standard 
intel-microcode_3.20180425.1~deb9u1_amd64.buildinfo
 662fd042fe05403bd0751a6dacda685d 1158186 non-free/admin standard 
intel-microcode_3.20180425.1~deb9u1_amd64.deb
 399cebc9abf1dac09f342e2bd36e1f34 4712 non-free/admin standard 
intel-microcode_3.20180425.1~deb9u1_i386.buildinfo
 f825398c78e13e5cb7e8b85440fe9b3a 1300084 non-free/admin standard 
intel-microcode_3.20180425.1~deb9u1_i386.deb

-----BEGIN PGP SIGNATURE-----
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=7VFL
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to