[El-errata] ELEA-2018-2397 Oracle Linux 7 microcode_ctl bug fix and enhancement update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Sep 27 22:14:03 PDT 2018
Oracle Linux Enhancement Advisory ELEA-2018-2397
http://linux.oracle.com/errata/ELEA-2018-2397.html
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
x86_64:
microcode_ctl-2.1-29.16.0.1.el7_5.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/microcode_ctl-2.1-29.16.0.1.el7_5.src.rpm
Description of changes:
[2:2.1-29.16.0.1]
- Remove upstream disclaimer file.
- Add UEK versions with Broadwell safeguard code to safe version list.
[2:2.1-29.16]
- Add 7.3.z kernel version to kernel_early configuration.
[2:2.1-29.15]
- Fix dracut module checks in Host-Only mode.
[2:2.1-29.14]
- Disable 06-4f-01 microcode in config (#1623630).
[2:2.1-29.12]
- Drop "hypervisor" /proc/cpuinfo flag check.
- Intel CPU microcode update to 20180807a.
- Add README.caveats documentation file.
- Add intel-microcode2ucode manual page.
- Add check for early microcode load, use it in microcode_ctl dracut module.
- Check that the currently running kernel is installed before
running dracut -f.
[2:2.1-29.11]
- Add an ability to disable "hypervisor" /proc/cpuinfo flag check.
- Intel CPU microcode update to 20180807.
- Resolves: #1614847.
[2:2.1-29.10]
- Provide %attr for the ghosted /lib/firmware.
[2:2.1-29.9]
- Remove model name blacklists from caveats configuration files.
[2.1-29.8]
- Add model name blacklist infrastructure.
- Store Intel ucode files in /usr/share/microcode_ctl; do not populate them
in a virtualised environment.
- Resolves: #1576334
[2.1-29.7]
- Add infrastructure for handling kernel-version-dependant microcode.
- Resolves: #1576334
[2.1-29.4]
- Intel CPU microcode update to 20180703.
- Resolves: #1573456
[2.1-29.3]
- Fix: Operation not permitted when installing microcode_ctl
- CVE-2018-3639 hw: cpu: speculative store bypass
- Resolves: #1573456
More information about the El-errata
mailing list