intel-microcode 20190514 does not provide Sandy Bridge (sigs 0x000206d7 and 0x000206d6)

Bug #1830123 reported by Steve Beattie
262
This bug affects 2 people
Affects Status Importance Assigned to Milestone
intel-microcode (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Intel is still working on Sandy Bridge microcode (sigs 0x000206d7 and 0x000206d6) to address MDS. This bug report is for people to track their status in Ubuntu.

Steve Beattie (sbeattie)
Changed in intel-microcode (Ubuntu):
status: New → Confirmed
Revision history for this message
Wenhan Shi (w.shi) wrote :

Hi

Do we have a timeline about when Intel will fix this bug?

Wenhan

Revision history for this message
Tyler Hicks (tyhicks) wrote : Re: [Bug 1830123] Re: intel-microcode 20190514 does not provide Sandy Bridge (sigs 0x000206d7 and 0x000206d6)

On 2019-06-19 04:40:20, Wenhan Shi wrote:
> Do we have a timeline about when Intel will fix this bug?

No, the bug fixing process isn't that predictable. They are actively
working on it and they're occasionally providing status updates in the
upstream bug report:

  https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/1

The most recent update is here:

  https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/1#issuecomment-500457763

Revision history for this message
Henrique de Moraes Holschuh (hmh) wrote :

Hello,

Release 20190618 is out, and has these updates.

I uploaded it to Debian unstable a few hours agoand we will issue it as a security update as well soon.

I imagine Ubuntu will do the same.

--
  Henrique de Moraes Holschuh <email address hidden>

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package intel-microcode - 3.20190618.0ubuntu0.16.04.1

---------------
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20190618
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    + Updated Microcodes:
      sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
      sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
      sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
    + Add MDS mitigation support for Sandy Bridge server and Core-X
      processor families.(LP: #1830123)

 -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700

Changed in intel-microcode (Ubuntu):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package intel-microcode - 3.20190618.0ubuntu0.18.10.1

---------------
intel-microcode (3.20190618.0ubuntu0.18.10.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20190618
    - CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
    + Updated Microcodes:
      sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
      sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
      sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
    + Add MDS mitigation support for Sandy Bridge server and Core-X
      processor families.(LP: #1830123)

 -- Steve Beattie <email address hidden> Thu, 20 Jun 2019 06:44:56 -0700

Changed in intel-microcode (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.