Your message dated Thu, 20 Jun 2019 18:38:03 -0300
with message-id <[email protected]>
and subject line fixed by intel-microcode/3.20190618.1
has caused the Debian Bug report #929073,
regarding intel-microcode: Missing MDS mitigations for some Intel CPUs
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
929073: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929073
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: intel-microcode
Severity: important
I noticed that on some of our servers (using a E5-2470 Sandy Bridge
CPU), the MDS mitigations were not picked up and after some digging
I found
https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
which lists all the CPU revisions for which updated microcode is not
yet available, but "Planned". It's obviously not actionable on the
Debian side, but I thought it's worth tracking nonetheless in the BTS
for the benefit of others wondering about missing microcode updates.
Cheers,
Moritz
--- End Message ---
--- Begin Message ---
Fixed: intel-microcode/3.20190618.1~
Intel upstream release 20190618 has the MDS updates for Sandybridge
server and HEDT/Core-X.
It has been uploaded as intel-microcode/3.20190618.1 to Debian unstable,
and as a security update for stretch (DSA-4447-2) and jessie
(DLA-1879-2).
I am Closing this bug...
--
Henrique Holschuh
--- End Message ---