Public bug reported:
[Impact]
AMD has recently updated the microcode in the linux-firmware tree for
family 17h processors to address Spectre variant 2. The Trusty 3.13
kernel cannot load the microcode because it is missing a backport of
upstream patch f4e9b7af0cd58dd039a0fb2cd67d57cea4889abf which leaves AMD
machines vulnerable.
[Test Case]
Test must be done on a 17h family processor:
1) Take note of the microcode version before applying updated microcode:
$ sudo cat /sys/devices/system/cpu/cpu0/microcode/version
0x8001227
2) Get updated amd64-microcode package from the Ubuntu Security Team.
Install it and reboot machine.
3) Verify that the microcode version has changed.
[Regression Potential]
The regression potential to the kernel revolves around the fact that the
IBRS/IBPB implementation in the 3.13 kernel may not have been put
through its paces yet due to a lack of available microcode updates.
There could be a latent bug present that is uncovered.
** Affects: linux (Ubuntu)
Importance: Critical
Assignee: Tyler Hicks (tyhicks)
Status: Invalid
** Affects: linux (Ubuntu Trusty)
Importance: Undecided
Assignee: Tyler Hicks (tyhicks)
Status: In Progress
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Tyler Hicks (tyhicks)
** Changed in: linux (Ubuntu)
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1774082
Title:
Trusty cannot load microcode for family 17h AMD processors
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1774082/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs