- Issued:
- 2024-10-16
- Updated:
- 2024-10-16
RHEA-2024:8159 - Product Enhancement Advisory
Synopsis
microcode_ctl bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.
Description
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
- microcode_ctl: kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) [rhel-8.10.0] (JIRA:RHEL-30859)
- microcode_ctl: kernel: Local information disclosure on Intel(R) Atom(R) processors [rhel-8.10.0] (JIRA:RHEL-30862)
- microcode_ctl: kernel: Local information disclosure in some Intel(R) processors [rhel-8.10.0] (JIRA:RHEL-30865)
- microcode_ctl: kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode [rhel-8.10.0] (JIRA:RHEL-30868)
- microcode_ctl: kernel: Possible Denial of Service on Intel(R) Processors [rhel-8.10.0] (JIRA:RHEL-30871)
- microcode_ctl: intel-microcode: Race conditions in some Intel(R) Processors [rhel-8] (JIRA:RHEL-41093)
- microcode_ctl: intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors [rhel-8.10.z] (JIRA:RHEL-41108)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
microcode_ctl-20240531-1.el8_10.src.rpm | SHA-256: a29c593ad2c6de619a13b0e7a589c225b0cc72e9d1804bae23d5291106b4f523 |
x86_64 | |
microcode_ctl-20240531-1.el8_10.x86_64.rpm | SHA-256: 970443f480252bbc988d44749f56ed3f85f7519e6658e1c37526604732e49e54 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.