- Issued:
- 2013-02-20
- Updated:
- 2013-02-20
RHBA-2013:0348 - Bug Fix Advisory
Synopsis
microcode_ctl bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated microcode_ctl packages that fix a bug and add various enhancements are
now available for Red Hat Enterprise Linux 6.
Description
The microcode_ctl packages provide utility code and microcode data to assist the
kernel in updating the CPU microcode at system boot time. This microcode
supports all current x86-based, Intel 64-based, and AMD64-based CPU models. It
takes advantage of the mechanism built-in to Linux that allows microcode to be
updated after system boot. When loaded, the updated microcode corrects the
behavior of various processors, as described in processor specification updates
issued by Intel and AMD for those processors.
This update fixes the following bug:
- Previously, a udev rule in /lib/udev/rules.d/89-microcode.rules allowed the
module to load more than once. On very large systems (for example, systems with
2048 or more CPUs), this could result in the system becoming unresponsive on
boot. With this update, the udev rule has been changed to ensure the module
loads only once. Very large systems now boot as expected. (BZ#740932)
This update also adds the following enhancements:
- The Intel CPU microcode file has been updated to version 20120606. (BZ#818096)
- The AMD CPU microcode file has been updated to version 20120910. (BZ#867078)
All users of microcode_ctl are advised to upgrade to these updated packages,
which fix this bug and add these enhancements. Note: a system reboot is
necessary for this update to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
Fixes
- BZ - 867078 - RHEL 6.4:Please include AMD microcode for processor families 10h-14h(microcode_amd.bin) and 15h(microcode_amd_fam15h.bin)
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
i386 | |
microcode_ctl-1.17-14.el6.i686.rpm | SHA-256: 5ae2f095a22aa8f7a18e473a7b4130b05295df692e4b05ad0f38e78bd481c114 |
microcode_ctl-debuginfo-1.17-14.el6.i686.rpm | SHA-256: 89434694fc1f2f1584920444c829afee308e61cc9c4eafd6acdb07925b752cb4 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
i386 | |
microcode_ctl-1.17-14.el6.i686.rpm | SHA-256: 5ae2f095a22aa8f7a18e473a7b4130b05295df692e4b05ad0f38e78bd481c114 |
microcode_ctl-debuginfo-1.17-14.el6.i686.rpm | SHA-256: 89434694fc1f2f1584920444c829afee308e61cc9c4eafd6acdb07925b752cb4 |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
i386 | |
microcode_ctl-1.17-14.el6.i686.rpm | SHA-256: 5ae2f095a22aa8f7a18e473a7b4130b05295df692e4b05ad0f38e78bd481c114 |
microcode_ctl-debuginfo-1.17-14.el6.i686.rpm | SHA-256: 89434694fc1f2f1584920444c829afee308e61cc9c4eafd6acdb07925b752cb4 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
i386 | |
microcode_ctl-1.17-14.el6.i686.rpm | SHA-256: 5ae2f095a22aa8f7a18e473a7b4130b05295df692e4b05ad0f38e78bd481c114 |
microcode_ctl-debuginfo-1.17-14.el6.i686.rpm | SHA-256: 89434694fc1f2f1584920444c829afee308e61cc9c4eafd6acdb07925b752cb4 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
i386 | |
microcode_ctl-1.17-14.el6.i686.rpm | SHA-256: 5ae2f095a22aa8f7a18e473a7b4130b05295df692e4b05ad0f38e78bd481c114 |
microcode_ctl-debuginfo-1.17-14.el6.i686.rpm | SHA-256: 89434694fc1f2f1584920444c829afee308e61cc9c4eafd6acdb07925b752cb4 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
microcode_ctl-1.17-14.el6.src.rpm | SHA-256: 4f3fd0abbb06678d753b4dc8955e5bd7970e9cb2bb88be8b8d442f15fd0fc21f |
x86_64 | |
microcode_ctl-1.17-14.el6.x86_64.rpm | SHA-256: 337bcb88e511e6453c2c42b0718c43fc0baf8aa7d58407bc1010af5248ebe433 |
microcode_ctl-debuginfo-1.17-14.el6.x86_64.rpm | SHA-256: bdb579e2353aa5b0aa7bca6adae4cd69fcba3d226ebcc10d3318290e8b8f0180 |
i386 | |
microcode_ctl-1.17-14.el6.i686.rpm | SHA-256: 5ae2f095a22aa8f7a18e473a7b4130b05295df692e4b05ad0f38e78bd481c114 |
microcode_ctl-debuginfo-1.17-14.el6.i686.rpm | SHA-256: 89434694fc1f2f1584920444c829afee308e61cc9c4eafd6acdb07925b752cb4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.