This bug was fixed in the package intel-microcode -
3.20190618.0ubuntu0.16.04.1
---------------
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium
* SECURITY UPDATE: New upstream microcode datafile 20190618
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ Updated Microcodes:
sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
+ Add MDS mitigation support for Sandy Bridge server and Core-X
processor families.(LP: #1830123)
-- Steve Beattie <[email protected]> Thu, 20 Jun 2019 06:44:56 -0700
** Changed in: intel-microcode (Ubuntu)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12126
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12127
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12130
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11091
** Changed in: intel-microcode (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1830123
Title:
intel-microcode 20190514 does not provide Sandy Bridge (sigs
0x000206d7 and 0x000206d6)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1830123/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs