This bug was fixed in the package intel-microcode - 3.20180425.1~ubuntu0.16.04.1
--------------- intel-microcode (3.20180425.1~ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode data file 20180425 to provide IBRS/IBPB/STIBP microcode support for Spectre variant 2 mitigation for Pentium Silver N/J5xxx, Celeron N/J4xxx (sig 0x000706a1) and Xeon E5/E7 v4; Core i7-69xx/68xx (sig 0x000406f1) (LP: #1769043) - merge from Debian. intel-microcode (3.20180425.1) unstable; urgency=medium * New upstream microcode data file 20180425 (closes: #897443, #895878) + Updated Microcodes: sig 0x000406f1, pf_mask 0xef, 2018-03-21, rev 0xb00002c, size 27648 sig 0x000706a1, pf_mask 0x01, 2017-12-26, rev 0x0022, size 73728 + Implements IBRS/IBPB/STIPB support, Spectre-v2 mitigation + Note that sig 0x000604f1 has been blacklisted from late-loading since Debian release 3.20171117.1. * source: remove undesired list files from microcode directories * source: switch to microcode-<id>.d/ since Intel dropped .dat support. -- Steve Beattie <sbeat...@ubuntu.com> Thu, 03 May 2018 12:45:47 -0700 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1769043 Title: intel-microcode: update to 20180425 drop To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1769043/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs