- Issued:
- 2019-05-14
- Updated:
- 2019-05-14
RHEA-2019:1214 - Product Enhancement Advisory
Synopsis
microcode_ctl update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated microcode_ctl packages are now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
[Updated 30 May 2019]
This advisory has been updated with an accurate list of CVEs for BZ#1704363.
This update does not change the packages in any way.
Description
The microcode_ctl packages provide microcode updates for Intel processors.
This update adds the following enhancement:
- The Intel CPU microcode has been updated to the latest upstream version to mitigate CVE-2018-12130, CVE-2018-12126, CVE-2018-12127, and CVE-2019-11091. (BZ#1704363)
Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.4 x86_64
- Red Hat Enterprise Linux Server - AUS 7.4 x86_64
- Red Hat Enterprise Linux Server - TUS 7.4 x86_64
- Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.4
SRPM | |
---|---|
microcode_ctl-2.1-22.20.el7_4.src.rpm | SHA-256: c92b07d0c71657449532aff15562319e963a93067cb8666badc204fe743e848c |
x86_64 | |
microcode_ctl-2.1-22.20.el7_4.x86_64.rpm | SHA-256: 4bac574a3114dff75ef586751300a0c22071921344e1ae3f634f62c36017532b |
microcode_ctl-debuginfo-2.1-22.20.el7_4.x86_64.rpm | SHA-256: f95fc2f01f1433210c69168f5732bf4b85703c07613910d8093e4c137854645d |
Red Hat Enterprise Linux Server - AUS 7.4
SRPM | |
---|---|
microcode_ctl-2.1-22.20.el7_4.src.rpm | SHA-256: c92b07d0c71657449532aff15562319e963a93067cb8666badc204fe743e848c |
x86_64 | |
microcode_ctl-2.1-22.20.el7_4.x86_64.rpm | SHA-256: 4bac574a3114dff75ef586751300a0c22071921344e1ae3f634f62c36017532b |
microcode_ctl-debuginfo-2.1-22.20.el7_4.x86_64.rpm | SHA-256: f95fc2f01f1433210c69168f5732bf4b85703c07613910d8093e4c137854645d |
Red Hat Enterprise Linux Server - TUS 7.4
SRPM | |
---|---|
microcode_ctl-2.1-22.20.el7_4.src.rpm | SHA-256: c92b07d0c71657449532aff15562319e963a93067cb8666badc204fe743e848c |
x86_64 | |
microcode_ctl-2.1-22.20.el7_4.x86_64.rpm | SHA-256: 4bac574a3114dff75ef586751300a0c22071921344e1ae3f634f62c36017532b |
microcode_ctl-debuginfo-2.1-22.20.el7_4.x86_64.rpm | SHA-256: f95fc2f01f1433210c69168f5732bf4b85703c07613910d8093e4c137854645d |
Red Hat Enterprise Linux EUS Compute Node 7.4
SRPM | |
---|---|
microcode_ctl-2.1-22.20.el7_4.src.rpm | SHA-256: c92b07d0c71657449532aff15562319e963a93067cb8666badc204fe743e848c |
x86_64 | |
microcode_ctl-2.1-22.20.el7_4.x86_64.rpm | SHA-256: 4bac574a3114dff75ef586751300a0c22071921344e1ae3f634f62c36017532b |
microcode_ctl-debuginfo-2.1-22.20.el7_4.x86_64.rpm | SHA-256: f95fc2f01f1433210c69168f5732bf4b85703c07613910d8093e4c137854645d |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.4
SRPM | |
---|---|
microcode_ctl-2.1-22.20.el7_4.src.rpm | SHA-256: c92b07d0c71657449532aff15562319e963a93067cb8666badc204fe743e848c |
x86_64 | |
microcode_ctl-2.1-22.20.el7_4.x86_64.rpm | SHA-256: 4bac574a3114dff75ef586751300a0c22071921344e1ae3f634f62c36017532b |
microcode_ctl-debuginfo-2.1-22.20.el7_4.x86_64.rpm | SHA-256: f95fc2f01f1433210c69168f5732bf4b85703c07613910d8093e4c137854645d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.