| Summary: | [UPDATE REQUEST 2016.1] microcode_ctl 2.1.15 | ||
|---|---|---|---|
| Product: | [ROSA-based products] ROSA Fresh | Reporter: | Evgenii Shatokhin <eugene.shatokhin> |
| Component: | Packages from Main | Assignee: | ROSA Linux Bugs <bugs> |
| Status: | RESOLVED DUPLICATE | QA Contact: | ROSA Linux Bugs <bugs> |
| Severity: | normal | ||
| Priority: | Normal | CC: | alzim, v.potapov, zombie.ryushu |
| Version: | Fresh | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://advisories.mageia.org/MGASA-2018-0260.html | ||
| Whiteboard: | |||
| Platform: | --- | ROSA Vulnerability identifier: | CVE-2017-5715 |
| RPM Package: | ISO-related: | ||
| Bad POT generating: | Upstream: | ||
|
Description
Evgenii Shatokhin
2018-01-16 12:38:30 MSK
Advisory: The microcode for CPUs was updated to v2.1-15. This update includes Intel microcode version 20180108. Build lists: https://abf.io/build_lists/2917204 https://abf.io/build_lists/2917205 Notes. 1. Please keep this update in testing for at least 2 weeks. There are reports like https://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/ but it is still unclear if our users are affected. 2. If the loaded CPU microcode causes problems, one can disable it at boot time by adding 'dis_ucode_ldr' (without quotes) to the kernel options, somewhere before 'quiet'. The update is sent to expanded testing *************************************** Ubuntu users and maintainers have found a regression in this microcode update and, unlike Intel, provided some details: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1742933 "the only issue I'm seeing with my i7-7500U is the inability to *enter sleep* since I upgraded to intel-microcode 20180108. I initially described the problem as being unable to resume from sleep but upon closer inspection, the laptop simple never fully goes to sleep, the power LED remains on steady while it normally would turn off during sleep. My keyboard's LED does turn off though which is why I got mislead." Comments from Ubuntu, from https://usn.ubuntu.com/usn/usn-3531-2/: "At the request of Intel, we have reverted to the previous packaged microcode version, the 20170707 release." So, let us wait till the next microcode update from Intel. This update adds microcode fixes and mitigations for Spectre (CVE-2017-5715) for the following: Intel Pentium Silver N/J5xxx, Celeron N/J4xxx Intel Xeon E5/E7 v4; Core i7-69xx/68xx Amd has also released their updated microcode for Fam15 and Fam17 cpus |