- 发布:
- 2018-09-11
- 已更新:
- 2018-09-11
RHEA-2018:2399 - Product Enhancement Advisory
概述
microcode_ctl enhancement update
类型/严重性
Product Enhancement Advisory
Red Hat Lightspeed patch analysis
识别并修复受此公告影响的系统。
标题
Updated microcode_ctl packages that add one enhancement are now available
for Red Hat Enterprise Linux 7.3 Extended Update Support.
描述
The microcode_ctl packages provide microcode updates for Intel and AMD
processors.
This update adds the following enhancement:
- The Intel CPU microcode has been updated to the latest upstream version
to mitigate CVE-2017-5715, known as the Spectre variant 2 vulnerability,
CVE-2018-3639, known as the Speculative Store Bypass vulnerability, and
CVE-2018-3620 and CVE-2018-3646, known as L1 Terminal Fault Attack
vulnerability. (BZ#1614845)
Users of microcode_ctl are advised to upgrade to these updated packages,
which add this enhancement. Note: a microcode_ctl service restart is
necessary for this update to take effect.
解决方案
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
受影响的产品
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.3 x86_64
- Red Hat Enterprise Linux Server - AUS 7.3 x86_64
- Red Hat Enterprise Linux Server - TUS 7.3 x86_64
- Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.3 x86_64
修复
- BZ - 1614845 - [RHEL-7] Update microcode to 20180807 [rhel-7.3.z]
CVE
(none)
参考
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.3
| SRPM | |
|---|---|
| microcode_ctl-2.1-16.19.el7_3.src.rpm | SHA-256: 678b89188d20c585ef1aec18e0219e2a909a3b0a1459af99523e632708682bc6 |
| x86_64 | |
| microcode_ctl-2.1-16.19.el7_3.x86_64.rpm | SHA-256: b1b106743e2a6c4d6f756746ef7ff05c08b0b51c43b1ed202ad27acc2b8a15eb |
| microcode_ctl-debuginfo-2.1-16.19.el7_3.x86_64.rpm | SHA-256: 3e6d6f169bbf6b9c2fa94c6dc4fdb0b3db7368b73171b57f1558362334752cb2 |
Red Hat Enterprise Linux Server - AUS 7.3
| SRPM | |
|---|---|
| microcode_ctl-2.1-16.19.el7_3.src.rpm | SHA-256: 678b89188d20c585ef1aec18e0219e2a909a3b0a1459af99523e632708682bc6 |
| x86_64 | |
| microcode_ctl-2.1-16.19.el7_3.x86_64.rpm | SHA-256: b1b106743e2a6c4d6f756746ef7ff05c08b0b51c43b1ed202ad27acc2b8a15eb |
| microcode_ctl-debuginfo-2.1-16.19.el7_3.x86_64.rpm | SHA-256: 3e6d6f169bbf6b9c2fa94c6dc4fdb0b3db7368b73171b57f1558362334752cb2 |
Red Hat Enterprise Linux Server - TUS 7.3
| SRPM | |
|---|---|
| microcode_ctl-2.1-16.19.el7_3.src.rpm | SHA-256: 678b89188d20c585ef1aec18e0219e2a909a3b0a1459af99523e632708682bc6 |
| x86_64 | |
| microcode_ctl-2.1-16.19.el7_3.x86_64.rpm | SHA-256: b1b106743e2a6c4d6f756746ef7ff05c08b0b51c43b1ed202ad27acc2b8a15eb |
| microcode_ctl-debuginfo-2.1-16.19.el7_3.x86_64.rpm | SHA-256: 3e6d6f169bbf6b9c2fa94c6dc4fdb0b3db7368b73171b57f1558362334752cb2 |
Red Hat Enterprise Linux EUS Compute Node 7.3
| SRPM | |
|---|---|
| microcode_ctl-2.1-16.19.el7_3.src.rpm | SHA-256: 678b89188d20c585ef1aec18e0219e2a909a3b0a1459af99523e632708682bc6 |
| x86_64 | |
| microcode_ctl-2.1-16.19.el7_3.x86_64.rpm | SHA-256: b1b106743e2a6c4d6f756746ef7ff05c08b0b51c43b1ed202ad27acc2b8a15eb |
| microcode_ctl-debuginfo-2.1-16.19.el7_3.x86_64.rpm | SHA-256: 3e6d6f169bbf6b9c2fa94c6dc4fdb0b3db7368b73171b57f1558362334752cb2 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.3
| SRPM | |
|---|---|
| microcode_ctl-2.1-16.19.el7_3.src.rpm | SHA-256: 678b89188d20c585ef1aec18e0219e2a909a3b0a1459af99523e632708682bc6 |
| x86_64 | |
| microcode_ctl-2.1-16.19.el7_3.x86_64.rpm | SHA-256: b1b106743e2a6c4d6f756746ef7ff05c08b0b51c43b1ed202ad27acc2b8a15eb |
| microcode_ctl-debuginfo-2.1-16.19.el7_3.x86_64.rpm | SHA-256: 3e6d6f169bbf6b9c2fa94c6dc4fdb0b3db7368b73171b57f1558362334752cb2 |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。