* SECURITY UPDATE: New upstream microcode data file 20180425 to
provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
- merge from Debian.
* New upstream microcode data file 20180425 (closes: #897443, #895878)
+ Updated Microcodes:
sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
+ Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
+ Note that sig 0x000604f1 has been blacklisted from late-loading
since Debian release 3.20171117.1.
* source: remove undesired list files from microcode directories
* source: switch to microcode-<id>.d/ since Intel dropped .dat
support.
-- Steve Beattie <email address hidden> Thu, 03 May 2018 12:45:47 -0700
This bug was fixed in the package intel-microcode - 3.20180425. 1~ubuntu0. 14.04.1
--------------- 1~ubuntu0. 14.04.1) trusty-security; urgency=medium
intel-microcode (3.20180425.
* SECURITY UPDATE: New upstream microcode data file 20180425 to
provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation
for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and
Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043)
- merge from Debian.
intel-microcode (3.20180425.1) unstable; urgency=medium
* New upstream microcode data file 20180425 (closes: #897443, #895878)
+ Updated Microcodes:
sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648
sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728
+ Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation
+ Note that sig 0x000604f1 has been blacklisted from late-loading
since Debian release 3.20171117.1.
* source: remove undesired list files from microcode directories
* source: switch to microcode-<id>.d/ since Intel dropped .dat
support.
-- Steve Beattie <email address hidden> Thu, 03 May 2018 12:45:47 -0700