{"affected":[{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Point of Sale 11 SP3","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-LTSS","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-TERADATA","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"microcode_ctl":"1.17-102.83.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"microcode_ctl","purl":"pkg:rpm/suse/microcode_ctl&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.17-102.83.24.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n  \nThis update for microcode_ctl fixes the following issues:\n\nThe Intel CPU Microcode bundle was updated to the 20180703 release\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and\nhelps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083)\n\nMore details can be found on:\n\n  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File\n\nFollowing chipsets are fixed in this round:\n\nModel        Stepping F-MO-S/PI      Old->New\n---- updated platforms ------------------------------------\nSNB-EP       C1       6-2d-6/6d 0000061c->0000061d Xeon E5\nSNB-EP       C2       6-2d-7/6d 00000713->00000714 Xeon E5\nIVT          C0       6-3e-4/ed 0000042c->0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K\nIVT          D1       6-3e-7/ed 00000713->00000714 Xeon E5 v2\nHSX-E/EP/4S  C0       6-3f-2/6f 0000003c->0000003d Xeon E5 v3\nHSX-EX       E0       6-3f-4/80 00000011->00000012 Xeon E7 v3\nSKX-SP/D/W/X H0       6-55-4/b7 02000043->0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX\nBDX-DE       A1       6-56-5/10 0e000009->0e00000a Xeon D-15x3N\nBDX-ML       B/M/R0   6-4f-1/ef 0b00002c->0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx\n","id":"SUSE-SU-2018:2076-1","modified":"2018-07-26T14:39:31Z","published":"2018-07-26T14:39:31Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182076-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1100147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-3639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-3640"}],"related":["CVE-2018-3639","CVE-2018-3640"],"summary":"Security update for microcode_ctl","upstream":["CVE-2018-3639","CVE-2018-3640"]}