{"id":"MGASA-2018-0079","summary":"Updated microcode packages fix security vulnerabilities","details":"This update provides microcode fixes and mitigations for Spectre\n(CVE-2017-5715) for many Intel CPUs produced in the last 5 years.\n\nSo far the Intel microcode updates are for several processors from the\nHaswell, Broadwell, Skylake, Kaby Lake, Coffee Lake, Gemini Lake, \nApollo Lake, Crystal Well and IVT platforms\n\nWe also have added the latest known microcode for Amd family 17 (Zen)\nprocessors.\n\nWe will provide more microcode updates when they are made available\nby Intel and Amd.\n\nWe also suggest that you check if there is updated  BIOS and EFI\nfirmwares from your hardware vendor.\n","modified":"2026-04-16T01:45:51.039981516Z","published":"2018-01-13T14:28:36Z","upstream":["CVE-2017-5715"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0079.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22337"},{"type":"ADVISORY","url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"},{"type":"WEB","url":"https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?product=52214"},{"type":"WEB","url":"http://www.amd.com/en/corporate/speculative-execution"},{"type":"WEB","url":"https://meltdownattack.com/"},{"type":"WEB","url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"}],"affected":[{"package":{"name":"microcode","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/microcode?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.20180108-1.mga5.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0079.json"}},{"package":{"name":"microcode","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/microcode?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.20180108-1.mga6.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0079.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}