- Issued:
- 2025-03-06
- Updated:
- 2025-03-06
RHBA-2025:2428 - Bug Fix Advisory
Synopsis
microcode_ctl bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.
Description
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
- microcode_ctl: Improper input validation in UEFI firmware [rhel-7.7.z] (JIRA:RHEL-82122)
- microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware [rhel-7.7.z] (JIRA:RHEL-82123)
- microcode_ctl: Improper input validation in UEFI firmware [rhel-7.7.z] (JIRA:RHEL-82124)
- microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm [rhel-7.7.z] (JIRA:RHEL-82125)
- microcode_ctl: Improper input validation in UEFI firmware [rhel-7.7.z] (JIRA:RHEL-82126)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.7 x86_64
Fixes
(none)References
(none)
Red Hat Enterprise Linux Server - AUS 7.7
SRPM | |
---|---|
microcode_ctl-2.1-53.25.el7_7.1.src.rpm | SHA-256: dbf87c442e4613a6dd7483bf97914617cff8d17f6ce0bd94ca450905fd65cd7f |
x86_64 | |
microcode_ctl-2.1-53.25.el7_7.1.x86_64.rpm | SHA-256: 9b473a5907af1cb7d44b21e2c3bb0b362483807cf4180bee607633c482499ecd |
microcode_ctl-debuginfo-2.1-53.25.el7_7.1.x86_64.rpm | SHA-256: 2b7ed2d7ffacd5ca2d4a6a72a3ef8c11be26942aac6da0b85161cac06996e9df |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.