- Issued:
- 2014-09-16
- Updated:
- 2014-09-16
RHEA-2014:1236 - Product Enhancement Advisory
Synopsis
microcode_ctl enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated microcode_ctl packages that add one enhancement are now available for
Red Hat Enterprise Linux 5.
Description
The microcode_ctl packages provide utility code and microcode data to assist the
kernel in updating the CPU microcode at system boot time. This microcode
supports all current x86-based, Intel 64-based, and AMD64-based CPU models. It
takes advantage of the mechanism built-in to Linux that allows microcode to be
updated after system boot. When loaded, the updated microcode corrects the
behavior of various processors, as described in processor specification updates
issued by Intel and AMD for those processors.
This update adds the following enhancement:
- With this update, the Intel CPU microcode has been updated to version
20140430. (BZ#1064359)
Users of microcode_ctl are advised to upgrade to these updated packages, which
add this enhancement. Note that a system reboot is necessary for this update to
take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
microcode_ctl-1.17-7.el5.src.rpm | SHA-256: 3e599054bd0d5312260b496d0b610efa056933c26eed9e9bcbd03af9d7603ce0 |
x86_64 | |
microcode_ctl-1.17-7.el5.x86_64.rpm | SHA-256: f388b3e9523584827a07e452b1e01c57c6024b54dabe5877a9789c6ddc41fcda |
microcode_ctl-debuginfo-1.17-7.el5.x86_64.rpm | SHA-256: e08a29d1cd115e8b681e2e18b051b4c59dd831ec8511162f078acceef18b5823 |
i386 | |
microcode_ctl-1.17-7.el5.i386.rpm | SHA-256: 7a92f71bb16c51a3f10688e84d2e05eb19976c6616a332682601c85b95d0bb2e |
microcode_ctl-debuginfo-1.17-7.el5.i386.rpm | SHA-256: 4fa18bab2458bc2e2b63dc9a1247eb6a6c266d4e27872dfbaa72d03450be9563 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
microcode_ctl-1.17-7.el5.src.rpm | SHA-256: 3e599054bd0d5312260b496d0b610efa056933c26eed9e9bcbd03af9d7603ce0 |
x86_64 | |
microcode_ctl-1.17-7.el5.x86_64.rpm | SHA-256: f388b3e9523584827a07e452b1e01c57c6024b54dabe5877a9789c6ddc41fcda |
microcode_ctl-debuginfo-1.17-7.el5.x86_64.rpm | SHA-256: e08a29d1cd115e8b681e2e18b051b4c59dd831ec8511162f078acceef18b5823 |
i386 | |
microcode_ctl-1.17-7.el5.i386.rpm | SHA-256: 7a92f71bb16c51a3f10688e84d2e05eb19976c6616a332682601c85b95d0bb2e |
microcode_ctl-debuginfo-1.17-7.el5.i386.rpm | SHA-256: 4fa18bab2458bc2e2b63dc9a1247eb6a6c266d4e27872dfbaa72d03450be9563 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
microcode_ctl-1.17-7.el5.src.rpm | SHA-256: 3e599054bd0d5312260b496d0b610efa056933c26eed9e9bcbd03af9d7603ce0 |
x86_64 | |
microcode_ctl-1.17-7.el5.x86_64.rpm | SHA-256: f388b3e9523584827a07e452b1e01c57c6024b54dabe5877a9789c6ddc41fcda |
microcode_ctl-debuginfo-1.17-7.el5.x86_64.rpm | SHA-256: e08a29d1cd115e8b681e2e18b051b4c59dd831ec8511162f078acceef18b5823 |
i386 | |
microcode_ctl-1.17-7.el5.i386.rpm | SHA-256: 7a92f71bb16c51a3f10688e84d2e05eb19976c6616a332682601c85b95d0bb2e |
microcode_ctl-debuginfo-1.17-7.el5.i386.rpm | SHA-256: 4fa18bab2458bc2e2b63dc9a1247eb6a6c266d4e27872dfbaa72d03450be9563 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
microcode_ctl-1.17-7.el5.src.rpm | SHA-256: 3e599054bd0d5312260b496d0b610efa056933c26eed9e9bcbd03af9d7603ce0 |
x86_64 | |
microcode_ctl-1.17-7.el5.x86_64.rpm | SHA-256: f388b3e9523584827a07e452b1e01c57c6024b54dabe5877a9789c6ddc41fcda |
microcode_ctl-debuginfo-1.17-7.el5.x86_64.rpm | SHA-256: e08a29d1cd115e8b681e2e18b051b4c59dd831ec8511162f078acceef18b5823 |
i386 | |
microcode_ctl-1.17-7.el5.i386.rpm | SHA-256: 7a92f71bb16c51a3f10688e84d2e05eb19976c6616a332682601c85b95d0bb2e |
microcode_ctl-debuginfo-1.17-7.el5.i386.rpm | SHA-256: 4fa18bab2458bc2e2b63dc9a1247eb6a6c266d4e27872dfbaa72d03450be9563 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.