Your message dated Tue, 23 Jan 2018 01:19:24 +0000
with message-id <[email protected]>
and subject line Bug#886998: fixed in intel-microcode
3.20180108.1+really20171117.1
has caused the Debian Bug report #886998,
regarding intel-microcode: regressions on Haswell, Broadwell (crashes/reboots)
and Kaby Lake (sleep-to-ram)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
886998: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886998
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: intel-microcode
Version: 3.20180108.1
Severity: grave
According to this:
https://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/
and this far more helpful information:
https://pcsupport.lenovo.com/br/en/product_security/ps500151
A subset of systems with the recent Haswell, Haswell/E, Broadwell,
Broadwell/E/DE, and Kaby Lake microcode updates have shown regressions
of either the "crash" sort, or of the "doesn't wake up from C3 sleep
(sleep-to-ram) properly" sort.
The Lenovo advisory implies that the regressions won't trigger always/on
every system. It is unclear at this time if they would only possibly
trigger when the new IBRS/IBPB Spectre mitigation functionality is
active (hint: Microsoft Windows 10 already activates it, but Debian
kernels don't enable it as we are still waiting for the upstream changes
to Linux, gcc and clang to stabilize).
To put it in simple terms: we don't know at the present time if Debian
systems would be affected by these microcode regressions right now, or
if they would start to be affected after the microcode-based Spectre
mitigation support is enabled in the kernels, or if they would be
affected at all.
Some of these possibly problematic microcode updates are indeed present
in Intel's 20180108 Linux microcode release. I will pause the
deployment of the 20180108 update in Debian: it will be restricted to
unstable (and possibly to testing, if the packages already migrated by
the time this bug report is active) until we either get more information
or a new set of microcode updates.
Updated packages removing the subset of problematic updates are not
going to be produced until at least next monday/tuesday for two reasons:
1. we don't have an exact list of signatures that are possibly
affected at this time. Removing all updates is equivalent to just
rolling back the package to the previous version.
2. there is a reasonably high chance of a new Intel microcode update
release in the next few days, which would most probably either revert
or fix the problematic microcode updates.
Should you face issues with the new microcode (note: test it with an
older kernel as well, since the current crop of new kernels are *ALSO*
causing boot and resume-from-sleep issues that are completely unrelated
to the microcode updates), please send a note to this bug report, with
the output of /proc/cpuinfo.
Previous versions of the packages are available here:
http://snapshot.debian.org/package/intel-microcode/
--
Henrique Holschuh
--- End Message ---
--- Begin Message ---
Source: intel-microcode
Source-Version: 3.20180108.1+really20171117.1
We believe that the bug you reported is fixed in the latest version of
intel-microcode, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <[email protected]> (supplier of updated
intel-microcode package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 22 Jan 2018 23:01:59 -0200
Source: intel-microcode
Binary: intel-microcode
Architecture: source amd64
Version: 3.20180108.1+really20171117.1
Distribution: unstable
Urgency: critical
Maintainer: Henrique de Moraes Holschuh <[email protected]>
Changed-By: Henrique de Moraes Holschuh <[email protected]>
Description:
intel-microcode - Processor microcode firmware for Intel CPUs
Closes: 886998
Changes:
intel-microcode (3.20180108.1+really20171117.1) unstable; urgency=critical
.
* Revert to release 20171117, as per Intel instructions issued to
the public in 2018-01-22 (closes: #886998)
* This effectively removes IBRS/IBPB/STIPB microcode support for
Spectre variant 2 mitigation.
Checksums-Sha1:
2ecfe6036525207dea082973949a538fb027af0d 1865
intel-microcode_3.20180108.1+really20171117.1.dsc
0dae4e35e418c31f0f8918dc156e959720f95e21 1801480
intel-microcode_3.20180108.1+really20171117.1.tar.xz
bdc109d548b74f7aea64ae1f17703f2f1ffbeb61 5665
intel-microcode_3.20180108.1+really20171117.1_amd64.buildinfo
210553661c42faae406f4edfedacdf0c804b0e7e 1270444
intel-microcode_3.20180108.1+really20171117.1_amd64.deb
Checksums-Sha256:
a7df931b02fa66df34106c1d4ff96b39921309b07fac2452b3112eeb29b87bcc 1865
intel-microcode_3.20180108.1+really20171117.1.dsc
376c988faedbee9ddfdfed6073fba65fbd3504a7fab4c3fe1d7e141e8e417126 1801480
intel-microcode_3.20180108.1+really20171117.1.tar.xz
04040e9355771e3f9c75a995107f9938f9e6fd304ea41ba351eddc77cbead848 5665
intel-microcode_3.20180108.1+really20171117.1_amd64.buildinfo
57a22d3dd3379149fc550f371874bfa864f6d2f264665379e8fc8c85bd90e6f0 1270444
intel-microcode_3.20180108.1+really20171117.1_amd64.deb
Files:
04360f77e2fe481ecce632f214cea4b8 1865 non-free/admin standard
intel-microcode_3.20180108.1+really20171117.1.dsc
c5d6395ae7719dabd161739b6aa21cef 1801480 non-free/admin standard
intel-microcode_3.20180108.1+really20171117.1.tar.xz
2a6ca1e54e22d5e16fae1f908edf4918 5665 non-free/admin standard
intel-microcode_3.20180108.1+really20171117.1_amd64.buildinfo
d99a8480e9d1405749b5b1ae4bc5c232 1270444 non-free/admin standard
intel-microcode_3.20180108.1+really20171117.1_amd64.deb
-----BEGIN PGP SIGNATURE-----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=fP+B
-----END PGP SIGNATURE-----
--- End Message ---