{"id":"MGASA-2018-0322","summary":"Updated microcode packages fix security vulnerability","details":"This microcode update provides the first set of fixes for Speculative Store\nBypass (SSBD, Spectre v4, CVE-2018-3639) and  Rogue System Register Read\n(RSRE, Spectre v3a, CVE-2018-3640) for Intel Sandybridge server, Ivy Bridge\nserver, Haswell server, Skylake server, Broadwell server, a few HEDT Core\ni7/i9 models.\n\nIncluded is also an AMD cpu microcode fix for family 15h Processor Revision\nID 0x00610f01 missed in the MGASA-2018-0260 update.\n","modified":"2026-04-16T06:24:48.158164850Z","published":"2018-07-25T08:24:17Z","upstream":["CVE-2018-3639","CVE-2018-3640"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0322.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23313"}],"affected":[{"package":{"name":"microcode","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/microcode?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.20180703-1.mga6.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0322.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}