Type: | BUG |
Impact: | NA |
Release Date: | 2018-02-28 |
[1:1.17-25.4.0.4]
- Enable early microcode load to allow updating Broadwell model 79
- Make sure 'modprobe microcode' is not executed on Broadwell model 79
- Run dracut upon microcode update
- Update 306f2 (06-3f-02) to rev 0x3c.
- Update 406f1 (06-4f-01) to rev 0xb00002a.
[1:1.17-25.4.0.3]
- Update 50654 (06-55-04) to rev 0x2000043.
[1:1.17-25.4.0.2]
- Revert: early microcode load to allow updating Broadwell model 79
- Revert: Make sure 'modprobe microcode' is not executed on Broadwell model 79
- Revert: Run dracut upon microcode update
- Revert updated Intel 20180108 microcode for CPUIDs: {CVE-2017-5715}
306c3 (06-3c-03 rev 0x23, Haswell);
306d4 (06-3d-04 rev 0x28, Broadwell);
306f2 (06-3f-02 rev 0x3b, Haswell);
306f4 (06-3f-04 rev 0x10, Haswell);
306e4 (06-3e-04 rev 0x42a, Ivy Bridge);
40651 (06-45-01 rev 0x21, Haswell);
40661 (06-46-01 rev 0x18, Haswell);
40671 (06-47-01 rev 0x1b, Broadwell);
406e3 (06-4e-03 rev 0xc2, Skylake);
406f1 (06-4f-01 rev 0xb000025, Broadwell);
50654 (06-55-04 rev 0x200003c, Skylake);
50662 (06-56-02 rev 0x14, Broadwell);
50663 (06-56-03 rev 0x7000011, Broadwell);
506e3 (06-5e-03 rev 0xc2, Skylake);
706a1 (06-7a-01 rev 0x22);
806e9 (06-8e-09 rev 0x80, Kaby Lake);
806ea (06-8e-0a rev 0x80);
906e9 (06-9e-09 rev 0x80, Kaby Lake)
906ea (06-9e-0a rev 0x80);
906eb (06-9e-0b rev 0x80)
[1:1.17-25.4.0.1]
- Enable early microcode load to allow updating Broadwell model 79
- Make sure 'modprobe microcode' is not executed on Broadwell model 79
- Run dracut upon microcode update
- Add updated Intel 20180108 microcode for CPUIDs: {CVE-2017-5715}
306c3 (06-3c-03 rev 0x23, Haswell);
306d4 (06-3d-04 rev 0x28, Broadwell);
306f2 (06-3f-02 rev 0x3b, Haswell);
306f4 (06-3f-04 rev 0x10, Haswell);
306e4 (06-3e-04 rev 0x42a, Ivy Bridge);
40651 (06-45-01 rev 0x21, Haswell);
40661 (06-46-01 rev 0x18, Haswell);
40671 (06-47-01 rev 0x1b, Broadwell);
406e3 (06-4e-03 rev 0xc2, Skylake);
406f1 (06-4f-01 rev 0xb000025, Broadwell);
50654 (06-55-04 rev 0x200003c, Skylake);
50662 (06-56-02 rev 0x14, Broadwell);
50663 (06-56-03 rev 0x7000011, Broadwell);
506e3 (06-5e-03 rev 0xc2, Skylake);
706a1 (06-7a-01 rev 0x22);
806e9 (06-8e-09 rev 0x80, Kaby Lake);
806ea (06-8e-0a rev 0x80);
906e9 (06-9e-09 rev 0x80, Kaby Lake)
906ea (06-9e-0a rev 0x80);
906eb (06-9e-0b rev 0x80)
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 6 (i386) | microcode_ctl-1.17-25.4.0.4.el6_9.src.rpm | 552f5464f4568c952a7ded884bc7af28cde4f44a8a4a0a587942b6505d97e58e | ELSA-2022-9670 | ol6_i386_latest |
microcode_ctl-1.17-25.4.0.4.el6_9.src.rpm | 552f5464f4568c952a7ded884bc7af28cde4f44a8a4a0a587942b6505d97e58e | ELSA-2022-9670 | ol6_i386_latest_archive | |
microcode_ctl-1.17-25.4.0.4.el6_9.src.rpm | 552f5464f4568c952a7ded884bc7af28cde4f44a8a4a0a587942b6505d97e58e | ELSA-2022-9670 | ol6_u9_i386_patch | |
microcode_ctl-1.17-25.4.0.4.el6_9.i686.rpm | b8c9400b4a5fd69e248ffd877351cd58671da085a2ce9f1d9011670bcf153ddb | ELSA-2022-9670 | ol6_i386_latest | |
microcode_ctl-1.17-25.4.0.4.el6_9.i686.rpm | b8c9400b4a5fd69e248ffd877351cd58671da085a2ce9f1d9011670bcf153ddb | ELSA-2022-9670 | ol6_i386_latest_archive | |
microcode_ctl-1.17-25.4.0.4.el6_9.i686.rpm | b8c9400b4a5fd69e248ffd877351cd58671da085a2ce9f1d9011670bcf153ddb | ELSA-2022-9670 | ol6_u9_i386_patch | |
Oracle Linux 6 (x86_64) | microcode_ctl-1.17-25.4.0.4.el6_9.src.rpm | 552f5464f4568c952a7ded884bc7af28cde4f44a8a4a0a587942b6505d97e58e | ELSA-2022-9670 | ol6_u9_x86_64_patch |
microcode_ctl-1.17-25.4.0.4.el6_9.src.rpm | 552f5464f4568c952a7ded884bc7af28cde4f44a8a4a0a587942b6505d97e58e | ELSA-2022-9670 | ol6_x86_64_latest | |
microcode_ctl-1.17-25.4.0.4.el6_9.x86_64.rpm | ecb6a1b6a4ee927dade5cec53af33e0cdde56308771013b799155a90d1c630dd | ELSA-2022-9670 | ol6_u9_x86_64_patch | |
microcode_ctl-1.17-25.4.0.4.el6_9.x86_64.rpm | ecb6a1b6a4ee927dade5cec53af33e0cdde56308771013b799155a90d1c630dd | ELSA-2022-9670 | ol6_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team