Lucene search

K
mageiaGentoo FoundationMGASA-2018-0322
HistoryJul 25, 2018 - 11:24 a.m.

Updated microcode packages fix security vulnerability

2018-07-2511:24:17
Gentoo Foundation
advisories.mageia.org
23

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.003 Low

EPSS

Percentile

65.2%

This microcode update provides the first set of fixes for Speculative Store Bypass (SSBD, Spectre v4, CVE-2018-3639) and Rogue System Register Read (RSRE, Spectre v3a, CVE-2018-3640) for Intel Sandybridge server, Ivy Bridge server, Haswell server, Skylake server, Broadwell server, a few HEDT Core i7/i9 models. Included is also an AMD cpu microcode fix for family 15h Processor Revision ID 0x00610f01 missed in the MGASA-2018-0260 update.

OSVersionArchitecturePackageVersionFilename
Mageia6noarchmicrocode< 0.20180703-1microcode-0.20180703-1.mga6.nonfree

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.003 Low

EPSS

Percentile

65.2%