[Bug 1783385] Re: intel-microcode: update to 20180703 drop
Markus Schade
1783385 at bugs.launchpad.net
Wed Aug 8 08:55:48 UTC 2018
We have been running this microcode on Xenial in production for the last
month on a few hundred SNB, IVB, HSW, BDW and SKL systems without seeing
any regression.
Seems like Intel has gotten it right this time on the first try.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to intel-microcode in Ubuntu.
https://bugs.launchpad.net/bugs/1783385
Title:
intel-microcode: update to 20180703 drop
Status in intel-microcode package in Ubuntu:
Fix Released
Status in intel-microcode source package in Trusty:
In Progress
Status in intel-microcode source package in Xenial:
In Progress
Status in intel-microcode source package in Bionic:
In Progress
Bug description:
Intel has released a new version of their microcode, that starts to
address Rogue System Register Read (RSRE, aka Spectre Variant 3a,
CVE-2018-3640) and Speculative Store Bypass (SSB, aka Spectre Variant
4, CVE-2018-3639).
Reference: https://downloadcenter.intel.com/download/27945/Linux-
Processor-Microcode-Data-File
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1783385/+subscriptions
More information about the foundations-bugs
mailing list