This bug was fixed in the package intel-microcode - 3.20210216.0ubuntu0.20.10.1
--------------- intel-microcode (3.20210216.0ubuntu0.20.10.1) groovy-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911) + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864 sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248 sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248 sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 -- Alex Murray <alex.mur...@canonical.com> Mon, 10 May 2021 16:41:24 +0930 ** Changed in: intel-microcode (Ubuntu Groovy) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1927911 Title: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1927911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs