MGASA-2018-0176

Source
https://advisories.mageia.org/MGASA-2018-0176.html
Import Source
https://advisories.mageia.org/MGASA-2018-0176.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0176
Related
Published
2018-03-19T12:13:14Z
Modified
2018-03-19T11:35:33Z
Summary
Updated microcode packages fix security vulnerabilities
Details

This update provides new microcode fixes and mitigations for Spectre (CVE-2017-5715) for many Intel CPUs produced in the last 5 years.

So far the Intel microcode updates are for several processors from many of Intel Haswell, Broadwell, Skylake, Kaby Lake, Coffee Lake, Gemini Lake, Apollo Lake, Crystal Well and IVT platforms.

Theese updated microcodes should also fix the instabilities that some users experienced with the earlier microcode updates released in MGASA-2018-0079.

We will provide more microcode updates later on when they are made available by Intel and Amd.

if you want to use this microcode on your current running kernel, you need to re-create the initrd (initial ramdisk used at boot time), you can do so by issuing the command 'dracut -f' as root, and reboot your system

We also suggest that you check if there is updated BIOS and EFI firmwares from your hardware vendor.

For a list of updated microcode revisions, read the referened Intel list page.

References
Credits

Affected packages

Mageia:6 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20180312-1.mga6.nonfree

Ecosystem specific

{
    "section": "nonfree"
}