- Issued:
- 2025-03-24
- Updated:
- 2025-03-24
RHEA-2025:3114 - Product Enhancement Advisory
Synopsis
microcode_ctl bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.
Description
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
- [RHEL 8] Update Intel CPU microcode to the latest version (JIRA:RHEL-67344)
- microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm [rhel-8.10.z] (JIRA:RHEL-79195)
- microcode_ctl: Improper input validation in UEFI firmware [rhel-8.10.z] (JIRA:RHEL-79197)
- microcode_ctl: Improper input validation in UEFI firmware [rhel-8.10.z] (JIRA:RHEL-79198)
- microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware [rhel-8.10.z] (JIRA:RHEL-79213)
- microcode_ctl: Improper input validation in UEFI firmware [rhel-8.10.z] (JIRA:RHEL-79216)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
Fixes
- RHEL-67344 - [RHEL 8] Update Intel CPU microcode to the latest version
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
microcode_ctl-20250211-1.el8_10.src.rpm | SHA-256: 17194a4a6aa29789e9d3103e07c6dcbb79135bfe12db0b55f1f927f800217892 |
x86_64 | |
microcode_ctl-20250211-1.el8_10.x86_64.rpm | SHA-256: d12cda51788604f44b204cea115dc647b4b32ce3f00552bd88cd9911f4b3f43a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.