- Issued:
- 2020-12-15
- Updated:
- 2020-12-15
RHEA-2020:5481 - Product Enhancement Advisory
Synopsis
microcode_ctl bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.
Description
The microcode_ctl packages provide microcode updates for Intel.
Bug Fix(es) and Enhancement(s):
- Update Intel CPU microcode to microcode-20201112 release:
- Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up
to 0x34;
- Updated the releasenote file.
- Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.
(BZ#1897187)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 1897187 - [rhel-8.3.0.z] Package microcode-20201112 release
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux Server - AUS 8.6
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux Server - AUS 8.4
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux Server - TUS 8.8
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux Server - TUS 8.6
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux Server - TUS 8.4
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
microcode_ctl-20200609-2.20201112.1.el8_3.src.rpm | SHA-256: 1c3982b040f685ed1555b1d85cd78417e024a523492ef77f07458eeb94742f98 |
x86_64 | |
microcode_ctl-20200609-2.20201112.1.el8_3.x86_64.rpm | SHA-256: 3d8690b943b9484d66b9c6521e82e31345b69578129633d4954668944b9e7f62 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.