{"id":"MGASA-2018-0176","summary":"Updated microcode packages fix security vulnerabilities","details":"This update provides new microcode fixes and mitigations for Spectre\n(CVE-2017-5715) for many Intel CPUs produced in the last 5 years.\n\nSo far the Intel microcode updates are for several processors from many\nof Intel Haswell, Broadwell, Skylake, Kaby Lake, Coffee Lake, Gemini Lake,\nApollo Lake, Crystal Well and IVT platforms.\n\nTheese updated microcodes should also fix the instabilities that some\nusers experienced with the earlier microcode updates released in\nMGASA-2018-0079.\n\nWe will provide more microcode updates later on when they are made\navailable by Intel and Amd.\n\nif you want to use this microcode on your current running kernel,\nyou need to re-create the initrd (initial ramdisk used at boot time),\nyou can do so by issuing the command 'dracut -f' as root, and reboot\nyour system\n\nWe also suggest that you check if there is updated  BIOS and EFI\nfirmwares from your hardware vendor.\n\nFor a list of updated microcode revisions, read the referened Intel list page.\n","modified":"2026-04-16T06:23:19.082223356Z","published":"2018-03-19T12:13:14Z","upstream":["CVE-2017-5715"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0176.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22762"},{"type":"WEB","url":"https://downloadcenter.intel.com/download/27591/Linux-Processor-Microcode-Data-File?product=873"}],"affected":[{"package":{"name":"microcode","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/microcode?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.20180312-1.mga6.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0176.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}