- Issued:
- 2020-09-29
- Updated:
- 2020-09-29
RHBA-2020:3968 - Bug Fix Advisory
Synopsis
microcode_ctl bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux
7.
Description
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
Fixes
- BZ - 1773347 - [RHEL 7] Re-generate initramfs not only for the currently running kernel
- BZ - 1780257 - [RHEL 7] Drop requirement on `kernel`
- BZ - 1833037 - [RHEL 7] Narrow down the SKX (SKL-SP/X/W/D) microcode blacklist
- BZ - 1835549 - Package microcode-20200508 release
- BZ - 1839192 - [RHEL 7] Package microcode-20200520 release
- BZ - 1846023 - [rhel-7.9] Enable SNB-EP caveat by default
- BZ - 1846133 - [rhel-7.9] skylake (06-4e-03) microcode update hangs
CVEs
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
microcode_ctl-2.1-73.el7.src.rpm | SHA-256: 27f9129525c63d091bf02acd6f485bb0eed08eedf2e773bf21729fc5b8c40d0d |
x86_64 | |
microcode_ctl-2.1-73.el7.x86_64.rpm | SHA-256: e7e5c3c4297d3002321a4bbc0e029972059a23a6835721aad84c836bb4e8dda0 |
microcode_ctl-debuginfo-2.1-73.el7.x86_64.rpm | SHA-256: aa3610a5400b882e23fd9261c2a78e665d22234527a81789ceb2e2a585ac8d6e |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7
SRPM | |
---|---|
microcode_ctl-2.1-73.el7.src.rpm | SHA-256: 27f9129525c63d091bf02acd6f485bb0eed08eedf2e773bf21729fc5b8c40d0d |
x86_64 | |
microcode_ctl-2.1-73.el7.x86_64.rpm | SHA-256: e7e5c3c4297d3002321a4bbc0e029972059a23a6835721aad84c836bb4e8dda0 |
microcode_ctl-debuginfo-2.1-73.el7.x86_64.rpm | SHA-256: aa3610a5400b882e23fd9261c2a78e665d22234527a81789ceb2e2a585ac8d6e |
Red Hat Enterprise Linux Workstation 7
SRPM | |
---|---|
microcode_ctl-2.1-73.el7.src.rpm | SHA-256: 27f9129525c63d091bf02acd6f485bb0eed08eedf2e773bf21729fc5b8c40d0d |
x86_64 | |
microcode_ctl-2.1-73.el7.x86_64.rpm | SHA-256: e7e5c3c4297d3002321a4bbc0e029972059a23a6835721aad84c836bb4e8dda0 |
microcode_ctl-debuginfo-2.1-73.el7.x86_64.rpm | SHA-256: aa3610a5400b882e23fd9261c2a78e665d22234527a81789ceb2e2a585ac8d6e |
Red Hat Enterprise Linux Desktop 7
SRPM | |
---|---|
microcode_ctl-2.1-73.el7.src.rpm | SHA-256: 27f9129525c63d091bf02acd6f485bb0eed08eedf2e773bf21729fc5b8c40d0d |
x86_64 | |
microcode_ctl-2.1-73.el7.x86_64.rpm | SHA-256: e7e5c3c4297d3002321a4bbc0e029972059a23a6835721aad84c836bb4e8dda0 |
microcode_ctl-debuginfo-2.1-73.el7.x86_64.rpm | SHA-256: aa3610a5400b882e23fd9261c2a78e665d22234527a81789ceb2e2a585ac8d6e |
Red Hat Enterprise Linux for Scientific Computing 7
SRPM | |
---|---|
microcode_ctl-2.1-73.el7.src.rpm | SHA-256: 27f9129525c63d091bf02acd6f485bb0eed08eedf2e773bf21729fc5b8c40d0d |
x86_64 | |
microcode_ctl-2.1-73.el7.x86_64.rpm | SHA-256: e7e5c3c4297d3002321a4bbc0e029972059a23a6835721aad84c836bb4e8dda0 |
microcode_ctl-debuginfo-2.1-73.el7.x86_64.rpm | SHA-256: aa3610a5400b882e23fd9261c2a78e665d22234527a81789ceb2e2a585ac8d6e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.