-
Notifications
You must be signed in to change notification settings - Fork 77
Please update microcode for 06-5e-03 #100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This is a bug in the debian package - it explicitly blacklists this microcode file (hence the .initramfs suffix). |
Thank you! Although, if I'm reading the dmesg output above correctly, it says that:
While in
I.e. they blacklist the late-loading, not the initramfs loading, which is successful as dmesg reports. |
I've booted that server with the latest Fedora 42 live CD; the same problem happens there. I.e. it doesn't appear to be a bug with the Debian packaging. root@gpmd:~# grep -r Vulnerable /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/gather_data_sampling:Vulnerable: No microcode
root@gpmd:~# dmesg
[ 0.184848] GDS: Vulnerable: No microcode
[ 0.225478] smpboot: CPU0: Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz (family: 0x6, model: 0x5e, stepping: 0x3)
[ 0.775377] microcode: Current revision: 0x000000f0
[ 0.775379] microcode: Updated early from: 0x000000d6
root@gpmd:~# rpm -qf /lib/firmware/intel-ucode
microcode_ctl-2.1-69.fc42.x86_64
root@gpmd:~# uname -a
Linux localhost-live 6.14.0-63.fc42.x86_64 #1 SMP PREEMPT_DYNAMIC Mon Mar 24 19:53:37 UTC 2025 x86_64 GNU/Linux
root@gpmd:~# grep PRETTY_NAME /etc/os-release
PRETTY_NAME="Fedora Linux 42 (Workstation Edition)" |
Well, the Intel CPU microcode guide recommends revison 0xf6 for signature 0x506e3, but that revision is not available for public distribution for some reason. The latest available is revision 0xf0. Maybe Intel can either publish it in a future release, or tell us why (most likely reason: requires full firmware update) ? |
@hmh: Checking... |
This product has reached its End of Servicing Update (ESU) date. See our Support webpage for further information. For OEM customers interested in extended updates beyond ESU, contact your Intel representative for details. For end users, to determine if your system is supported beyond ESU, contact your system manufacturer for details. |
Hi, using the latest microcode, I'm still vulnerable to GDS.
Here is my CPU and microcode information:
The text was updated successfully, but these errors were encountered: