This bug was fixed in the package intel-microcode -
3.20180807a.0ubuntu0.14.04.1
---
intel-microcode (3.20180807a.0ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: New upstream microcode update to provide L1D cache
flush support to mitigate L1TF (CVE-2018-3646
This bug was fixed in the package intel-microcode -
3.20180807a.0ubuntu0.18.04.1
---
intel-microcode (3.20180807a.0ubuntu0.18.04.1) bionic-security; urgency=medium
* SECURITY UPDATE: New upstream microcode update to provide L1D cache
flush support to mitigate L1TF (CVE-2018-3646
This bug was fixed in the package intel-microcode -
3.20180807a.0ubuntu0.16.04.1
---
intel-microcode (3.20180807a.0ubuntu0.16.04.1) xenial-security; urgency=medium
* SECURITY UPDATE: New upstream microcode update to provide L1D cache
flush support to mitigate L1TF (CVE-2018-3646
As the 20180807 MCU can currently not be distributed due to licensing
issues, this update is even more important as it at least provides the
SSBD and L1TF fixes for server CPUs.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://b
Since the L1TF has been disclosed yesterday, the update has become even
more urgent. The MCU also contains the necessary mitigations for SGX as
well.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/17833
We have been running this microcode on Xenial in production for the last
month on a few hundred SNB, IVB, HSW, BDW and SKL systems without seeing
any regression.
Seems like Intel has gotten it right this time on the first try.
--
You received this bug notification because you are a member of Ubu
Any update on the testing effort? The timeline on a release?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1783385
Title:
intel-microcode: update to 20180703 drop
To manage notifications about thi
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3640
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3639
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1783385
Tit
This was fixed in cosmic in https://launchpad.net/ubuntu/+source/intel-
microcode/3.20180703.2ubuntu1 ; pacakge for trusty, xenial, and bionic
are available for testing in the ubuntu-security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/ .
Please note that packa