From e0bb63b76f12417553157b9b9414f25224c5bb04 Mon Sep 17 00:00:00 2001 From: MSVSphere Packaging Team Date: Mon, 11 Dec 2023 16:39:50 +0300 Subject: [PATCH] import microcode_ctl-20230808-2.el8 --- SPECS/microcode_ctl.spec | 27 ++++++++++++++------------- 1 file changed, 14 insertions(+), 13 deletions(-) diff --git a/SPECS/microcode_ctl.spec b/SPECS/microcode_ctl.spec index 90cac94..fa3a60a 100644 --- a/SPECS/microcode_ctl.spec +++ b/SPECS/microcode_ctl.spec @@ -12,8 +12,8 @@ Summary: CPU microcode updates for Intel x86 processors Name: microcode_ctl -Version: 20220809 -Release: 2.%{intel_ucode_version}.2%{?dist} +Version: %{intel_ucode_version} +Release: 2%{?dist} Epoch: 4 License: CC0 and Redistributable, no modification permitted URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files @@ -569,13 +569,14 @@ rm -rf %{buildroot} %changelog -* Tue Aug 22 2023 Eugene Syromiatnikov - 4:20220809-2.20230808.2 +* Tue Aug 22 2023 Eugene Syromiatnikov - 4:20230808-2 - Add support for the new, more correct, variant of dracut's default $fw_dir path in dracut_99microcode_ctl-fw_dir_override_module_init.sh. -* Thu Aug 10 2023 Eugene Syromiatnikov - 4:20220809-2.20230808.1 +* Thu Aug 10 2023 Eugene Syromiatnikov - 4:20230808-1 - Update Intel CPU microcode to microcode-20230808 release, addresses - CVE-2022-40982, CVE-2022-41804, CVE-2023-23908 (#2229733): + CVE-2022-40982, CVE-2022-41804, CVE-2023-23908 (#2213125, #2223993, #2230678, + #2230690): - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006f05 up to 0x2007006; @@ -774,7 +775,7 @@ rm -rf %{buildroot} - Update of 06-be-00/0x11 (ADL-N A0) microcode from revision 0x10 up to 0x11 (old pf 0x1). -* Mon Aug 07 2023 Eugene Syromiatnikov - 4:20220809-2.20230516.1 +* Mon Aug 07 2023 Eugene Syromiatnikov - 4:20230516-1 - Update Intel CPU microcode to microcode-20230516 release (#2213125): - Addition of 06-be-00/0x01 (ADL-N A0) microcode at revision 0x10; - Addition of 06-9a-04/0x40 (AZB A0) microcode at revision 0x4; @@ -946,24 +947,24 @@ rm -rf %{buildroot} - Update of 06-ba-03/0xc0 (RPL-U 2+8 Q0) microcode from revision 0x410e up to 0x4112. -* Tue Aug 01 2023 Eugene Syromiatnikov - 4:20220809-2.20230214.4 +* Tue Aug 01 2023 Eugene Syromiatnikov - 4:20230214-4 - Avoid spurious find failures due to calls on directories that may not exist (#2231065). -* Wed Jul 26 2023 MSVSphere Packaging Team - 4:20220809-2.20230214.3 +* Wed Jul 26 2023 MSVSphere Packaging Team - 4:20230214-3 - Rebuilt for MSVSphere 8.8 -* Wed Jun 28 2023 Eugene Syromiatnikov - 4:20220809-2.20230214.3 +* Wed Jun 28 2023 Eugene Syromiatnikov - 4:20230214-3 - Force locale to C in check_caveats, reload_microcode, and update_ucode (#2218096). -* Tue Jun 06 2023 Eugene Syromiatnikov - 4:20220809-2.20230214.2 +* Tue Jun 06 2023 Eugene Syromiatnikov - 4:20230214-2 - Cleanup the dangling symlinks in update_ucode (#2135376). -* Wed Feb 15 2023 Eugene Syromiatnikov - 4:20220809-2.20230214.1 +* Wed Feb 15 2023 Eugene Syromiatnikov - 4:20230214-1 - Update Intel CPU microcode to microcode-20230214 release, addresses - CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090 (#2171233, - #2171258): + CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090 (#2171234, + #2171259): - Addition of 06-6c-01/0x10 (ICL-D B0) microcode at revision 0x1000211; - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode at revision 0x2b000181;