{"affected":[{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.15.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Point of Sale 11 SP3","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.15.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.15.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-LTSS","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.15.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.15.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-TERADATA","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.15.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.15.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.15.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.15.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.15.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n  \nThis update for ucode-intel fixes the following issues:\n\nThe Intel CPU microcode version was updated to version 20180312.\n\nThis update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)\n\n- New Platforms\n\n  - BDX-DE EGW A0 6-56-5:10 e000009\n  - SKX B1 6-55-3:97 1000140\n\n- Updates\n\n  - SNB D2 6-2a-7:12 29->2d\n  - JKT C1 6-2d-6:6d 619->61c\n  - JKT C2 6-2d-7:6d 710->713\n  - IVB E2 6-3a-9:12 1c->1f\n  - IVT C0 6-3e-4:ed 428->42c\n  - IVT D1 6-3e-7:ed 70d->713\n  - HSW Cx/Dx 6-3c-3:32 22->24\n  - HSW-ULT Cx/Dx 6-45-1:72 20->23\n  - CRW Cx 6-46-1:32 17->19\n  - HSX C0 6-3f-2:6f 3a->3c\n  - HSX-EX E0 6-3f-4:80 0f->11\n  - BDW-U/Y E/F 6-3d-4:c0 25->2a\n  - BDW-H E/G 6-47-1:22 17->1d\n  - BDX-DE V0/V1 6-56-2:10 0f->15\n  - BDW-DE V2 6-56-3:10 700000d->7000012\n  - BDW-DE Y0 6-56-4:10 f00000a->f000011\n  - SKL-U/Y D0 6-4e-3:c0 ba->c2\n  - SKL R0 6-5e-3:36 ba->c2\n  - KBL-U/Y H0 6-8e-9:c0 62->84\n  - KBL B0 6-9e-9:2a 5e->84\n  - CFL D0 6-8e-a:c0 70->84\n  - CFL U0 6-9e-a:22 70->84\n  - CFL B0 6-9e-b:02 72->84\n  - SKX H0 6-55-4:b7 2000035->2000043\n\n","id":"SUSE-SU-2018:0705-1","modified":"2018-03-16T12:43:32Z","published":"2018-03-16T12:43:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20180705-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5715"}],"related":["CVE-2017-5715"],"summary":"Security update for microcode_ctl","upstream":["CVE-2017-5715"]}