Bug#929007: intel-microcode: Update intel-microcode to 20190514

2019-05-14 Thread Markus Schade
Package: intel-microcode Version: 3.20190312.1 Severity: grave Tags: security Dear Maintainer, Intel has released a new microcode version which includes updates for most CPU models since Nehalem providing the necessary prerequisites for the recently disclosed MDS vulnerabilities Please consider

Bug#906158: intel-microcode: Update intel-microcode to 20180807

2018-08-23 Thread Markus Schade
Hi everyone, apparently Intel has changed its mind and is reverting to the old license: https://01.org/mcu-path-license-2018 https://wccftech.com/intel-microcode-update-gag-order-benchmarks/ But I guess we have to to wait for the actual MCU download to incorporate this change. What do you think,

Bug#906158: intel-microcode: Update intel-microcode to 20180807

2018-08-19 Thread Markus Schade
Henrique, could you please clarify what concerns Debian has with the license? Other distros seem to have no problems. I see updated packages from Fedora, OpenSUSE, Gentoo and Archlinux. Best regards, Markus

Bug#906158: intel-microcode: Update intel-microcode to 20180807

2018-08-18 Thread Markus Schade
Hi, Am 18.08.2018 um 13:39 schrieb Moritz Mühlenhoff: > Do we have also indication whether the 20180703 release also fixed the > SGX angle? No sure, if you are asking Henrique or me, but yes, the microcode does include the mitigation for SGX aka Foreshadow. It is also explicitly stated by Intel

Bug#906158: intel-microcode: Update intel-microcode to 20180807

2018-08-17 Thread Markus Schade
Am 17.08.2018 um 09:54 schrieb Moritz Mühlenhoff: > This microcode release happened a week before the disclosure of L1TF and with > all previous CPU bugs, Intel initially only shipped updates to OEMs and only > released general microcode updates weeks/months later. > > Have you been able to confir

Bug#906160: intel-microcode: Update intel-microcode to 20180807

2018-08-15 Thread Markus Schade
Package: intel-microcode Version: 3.20180703.1 Severity: grave Tags: security Dear Maintainer, Intel has released a new microcode version which includes updates for further CPU models providing the necessary code for SSBD as well as the recently disclosed L1TF vulnerability https://downloadcente

Bug#906158: intel-microcode: Update intel-microcode to 20180807

2018-08-15 Thread Markus Schade
Package: intel-microcode Version: 3.20180425.1 Severity: grave Tags: security Dear Maintainer, Intel has released a new microcode version which includes updates for further CPU models providing the necessary code for SSBD as well as the recently disclosed L1TF vulnerability https://downloadcente

Bug#903018: intel-microcode: Update intel-microcode to 20180703

2018-07-05 Thread Markus Schade
Package: intel-microcode Version: 3.20180425.1 Severity: grave Tags: security Dear Maintainer, Intel has released a new microcode version which includes the prerequisites for SSBD patches https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File Contrary to what the do

Bug#651786: Missing dependency on dpatch

2011-12-13 Thread Markus Schade
I have orphaned this package ages ago. It should not even be in squeeze. Even if I would upload a new package that would add the depedency to dpatch, I doubt very much that it will built against the squeeze kernel. So I would tag this as won't fix, even though I would prefer that this package to

Bug#390429: bcm5700-source: does not compile against 2.6.18

2007-03-09 Thread Markus Schade
I'm curious: What's the point of this package ? Are there devices not supported by the tg3 driver ? It's not a support problem, but a stability problem. I have a Dell server with the 5700 chip, which will hang predictably after a day or so. Also the TSO support is not very mature in the in-kern

Bug#390429: bcm5700-source: does not compile against 2.6.18

2007-03-09 Thread Markus Schade
I send an ITA for this package to wnpp (http://bugs.debian.org/366806). An updated package with the last and latest bcm driver is available at https://www.csn.tu-chemnitz.de/~marks/debian/ waiting for upload by a maintainer. Regards, Markus -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a s