On Wed, 14 Mar 2018, Moritz Muehlenhoff wrote:
> On Sun, Jan 21, 2018 at 07:47:35AM -0200, Henrique de Moraes Holschuh wrote:
> > severity 887856 grave
> > block 887856 by 886998
> > thanks
> > 
> > On Sat, 20 Jan 2018, Julien Aubin wrote:
> > > As of now intel-microcode of stretch is still set to 20170707 (20171117
> > > through
> > > bpo) which lets users vulnerable to Spectre attack CVE-2017-5715. Could 
> > > you
> > > please bring quickly the microcode update to stretch, at least on bpo ?
> > 
> > Please refer to bug #886998
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886998
> > 
> > We will wait for a new, official Intel microcode release before we
> > consider updating the intel-microcode package in stable and backports.
> 
> https://downloadcenter.intel.com/download/27591/Linux-Processor-Microcode-Data-File
> 
> These should be good now? 

Yes, uploaded to unstable a few hours ago (might be waiting on dinstall,
though).

> Let's keep this cooking in unstable for a while before considering an upgrade 
> in stable, though.

Sure, uploaded with medium priority to get 10 days worth of unstable,
then let's get it to wait around on testing for at least 1 month *after*
the next kernel update in testing (which should re-enable IBRS+IBPB on
Skylake).

Unless we get lots of indirect coverage from other distros that would
allow us to speed this up, I'd say we'll wait about 2 months before
proposing it for -stable.

I will upload the usual backports after it propagates to testing,
though.

-- 
  Henrique Holschuh

Reply via email to