MGASA-2018-0322

Source
https://advisories.mageia.org/MGASA-2018-0322.html
Import Source
https://advisories.mageia.org/MGASA-2018-0322.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0322
Related
Published
2018-07-25T08:24:17Z
Modified
2018-07-25T08:02:49Z
Summary
Updated microcode packages fix security vulnerability
Details

This microcode update provides the first set of fixes for Speculative Store Bypass (SSBD, Spectre v4, CVE-2018-3639) and Rogue System Register Read (RSRE, Spectre v3a, CVE-2018-3640) for Intel Sandybridge server, Ivy Bridge server, Haswell server, Skylake server, Broadwell server, a few HEDT Core i7/i9 models.

Included is also an AMD cpu microcode fix for family 15h Processor Revision ID 0x00610f01 missed in the MGASA-2018-0260 update.

References
Credits

Affected packages

Mageia:6 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20180703-1.mga6.nonfree

Ecosystem specific

{
    "section": "nonfree"
}