- Issued:
- 2019-10-16
- Updated:
- 2019-10-16
RHEA-2019:3090 - Product Enhancement Advisory
Synopsis
microcode_ctl enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.
Description
The microcode_ctl packages provide microcode updates for AMD and Intel
x86 processors.
Bug Fix(es) and Enhancement(s):
- [rhel-6.10.z] Update Intel microcode version to microcode-20190918 (BZ#1753540)
- Dell PowerEdge M820 servers panicking after microcode / firmware upgrades (BZ#1758382)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
Fixes
- BZ - 1753540 - [rhel-6.10.z] Update Intel microcode version to microcode-20190918
- BZ - 1758382 - Dell PowerEdge M820 servers panicking after microcode / firmware upgrades
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
microcode_ctl-1.17-33.17.el6_10.src.rpm | SHA-256: 225968d107e49d363635b1e42096da88abe1746e7317853389923568c272ce6e |
x86_64 | |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
i386 | |
microcode_ctl-1.17-33.17.el6_10.i686.rpm | SHA-256: 55f0a914c204d3b04820cba0279fa8461e369a4194a8f72068e7b2f22a720068 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.i686.rpm | SHA-256: 0856cf4e768f1acea6fa918d7ba368de435d63f1982f3509c2f5f20254faf8da |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
microcode_ctl-1.17-33.17.el6_10.src.rpm | SHA-256: 225968d107e49d363635b1e42096da88abe1746e7317853389923568c272ce6e |
x86_64 | |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
i386 | |
microcode_ctl-1.17-33.17.el6_10.i686.rpm | SHA-256: 55f0a914c204d3b04820cba0279fa8461e369a4194a8f72068e7b2f22a720068 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.i686.rpm | SHA-256: 0856cf4e768f1acea6fa918d7ba368de435d63f1982f3509c2f5f20254faf8da |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
microcode_ctl-1.17-33.17.el6_10.src.rpm | SHA-256: 225968d107e49d363635b1e42096da88abe1746e7317853389923568c272ce6e |
x86_64 | |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
i386 | |
microcode_ctl-1.17-33.17.el6_10.i686.rpm | SHA-256: 55f0a914c204d3b04820cba0279fa8461e369a4194a8f72068e7b2f22a720068 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.i686.rpm | SHA-256: 0856cf4e768f1acea6fa918d7ba368de435d63f1982f3509c2f5f20254faf8da |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
microcode_ctl-1.17-33.17.el6_10.src.rpm | SHA-256: 225968d107e49d363635b1e42096da88abe1746e7317853389923568c272ce6e |
x86_64 | |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
i386 | |
microcode_ctl-1.17-33.17.el6_10.i686.rpm | SHA-256: 55f0a914c204d3b04820cba0279fa8461e369a4194a8f72068e7b2f22a720068 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.i686.rpm | SHA-256: 0856cf4e768f1acea6fa918d7ba368de435d63f1982f3509c2f5f20254faf8da |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
microcode_ctl-1.17-33.17.el6_10.src.rpm | SHA-256: 225968d107e49d363635b1e42096da88abe1746e7317853389923568c272ce6e |
x86_64 | |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
microcode_ctl-1.17-33.17.el6_10.src.rpm | SHA-256: 225968d107e49d363635b1e42096da88abe1746e7317853389923568c272ce6e |
x86_64 | |
microcode_ctl-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 6e2693fd6c9802eac174be495a021d8b14aae6b4e3c67b7007e2b50ff3ea5767 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.x86_64.rpm | SHA-256: 1cd5faf23a2a2fb5297be6052e10d572950e257a200730a8064d72fedf85aa8f |
i386 | |
microcode_ctl-1.17-33.17.el6_10.i686.rpm | SHA-256: 55f0a914c204d3b04820cba0279fa8461e369a4194a8f72068e7b2f22a720068 |
microcode_ctl-debuginfo-1.17-33.17.el6_10.i686.rpm | SHA-256: 0856cf4e768f1acea6fa918d7ba368de435d63f1982f3509c2f5f20254faf8da |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.