[Bug 1783385] Re: intel-microcode: update to 20180703 drop

Markus Schade 1783385 at bugs.launchpad.net
Wed Aug 8 08:55:48 UTC 2018


We have been running this microcode on Xenial in production for the last
month on a few hundred SNB, IVB, HSW, BDW and SKL systems without seeing
any regression.

Seems like Intel has gotten it right this time on the first try.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to intel-microcode in Ubuntu.
https://bugs.launchpad.net/bugs/1783385

Title:
  intel-microcode: update to 20180703 drop

Status in intel-microcode package in Ubuntu:
  Fix Released
Status in intel-microcode source package in Trusty:
  In Progress
Status in intel-microcode source package in Xenial:
  In Progress
Status in intel-microcode source package in Bionic:
  In Progress

Bug description:
  Intel has released a new version of their microcode, that starts to
  address Rogue System Register Read (RSRE, aka Spectre Variant 3a,
  CVE-2018-3640) and Speculative Store Bypass (SSB, aka Spectre Variant
  4, CVE-2018-3639).

  Reference: https://downloadcenter.intel.com/download/27945/Linux-
  Processor-Microcode-Data-File

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1783385/+subscriptions



More information about the foundations-bugs mailing list