*** This bug is a security vulnerability *** Public security bug reported:
Intel has released a new version of their microcode, that starts to address Rogue System Register Read (RSRE, aka Spectre Variant 3a, CVE-2018-3640) and Speculative Store Bypass (SSB, aka Spectre Variant 4, CVE-2018-3639). Reference: https://downloadcenter.intel.com/download/27945/Linux- Processor-Microcode-Data-File ** Affects: intel-microcode (Ubuntu) Importance: Undecided Status: New ** Affects: intel-microcode (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: intel-microcode (Ubuntu Xenial) Importance: Undecided Status: New ** Affects: intel-microcode (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: intel-microcode (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: intel-microcode (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: intel-microcode (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1783385 Title: intel-microcode: update to 20180703 drop To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1783385/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
