- Issued:
- 2018-06-12
- Updated:
- 2018-06-12
RHBA-2018:1841 - Bug Fix Advisory
Synopsis
linux-firmware bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated linux-firmware packages that fix one bug are now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.
Description
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
This update fixes the following bug:
- A previous update to the linux-firmware packages that added new capabilities to enhance mitigation of CVE-2017-5715 (the Spectre variant 2 vulnerability) introduced a regression when it inadvertently removed support for AMD CPUID 0x00610f01. As a consequence, the kernel would be unable to update the microcode loaded by BIOS or UEFI if it was outdated because the loaded microcode version is dependent on the BIOS or UEFI version in use. This update restores microcode support for the mentioned CPU family, and the microcode can be correctly updated again. (BZ#1585936)
Users of linux-firmware are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 7.2 x86_64
Fixes
- BZ - 1585936 - include AMD CPUID 0x00610f01 in RHEL-7 linux-firmware [rhel-7.2.z]
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 7.2
SRPM | |
---|---|
linux-firmware-20150904-45.2.git6ebf5d5.el7_2.src.rpm | SHA-256: 3b13bfedc2f65e9b29cbc33e593f57cd929507108d3059cf1d62918ddf529a44 |
x86_64 | |
iwl100-firmware-39.31.5.1-45.2.el7_2.noarch.rpm | SHA-256: a94b461fecc77302347709ab8b400a614c395d97f7c3601d01cd62b47af17a71 |
iwl1000-firmware-39.31.5.1-45.2.el7_2.noarch.rpm | SHA-256: a6c7579cd7cced7afa98595fd8d1dd5f4b187def79e253b577258566ab924510 |
iwl105-firmware-18.168.6.1-45.2.el7_2.noarch.rpm | SHA-256: a212d0bf7fcd536347b4d231b95bd5c768410d3616f2736d3d3fbf91a645bf3a |
iwl135-firmware-18.168.6.1-45.2.el7_2.noarch.rpm | SHA-256: 3d26a793c60566032b46b7a399c34b393e75e35096c7d8d81c444d39e7616add |
iwl2000-firmware-18.168.6.1-45.2.el7_2.noarch.rpm | SHA-256: 3c95c96a6b859fd6d218ce38e4effe1771678e14df12dfcb95e2c704e1e7e1fe |
iwl2030-firmware-18.168.6.1-45.2.el7_2.noarch.rpm | SHA-256: dfd4556c0d4cf21ea46054f0776ec246af2cb8cdbed71914fcf50d4fdc8e7c29 |
iwl3160-firmware-22.0.7.0-45.2.el7_2.noarch.rpm | SHA-256: a8dc15b534918067e9eab3ca33f2af160c07a301b614027caa6e111111b58c6e |
iwl3945-firmware-15.32.2.9-45.2.el7_2.noarch.rpm | SHA-256: 7793ca122f8492ce7a6f9d4eca706c5c1cd88f99a180c46d61c867d3ef89e6ce |
iwl4965-firmware-228.61.2.24-45.2.el7_2.noarch.rpm | SHA-256: e8c7987f3a5d3c19a6a0e9536bf89932205723acf831876effea57beddd7fcc0 |
iwl5000-firmware-8.83.5.1_1-45.2.el7_2.noarch.rpm | SHA-256: e5120a7465c910d5e9ef242dc393adff835b2c07890d39ce83a7ceb986aa42aa |
iwl5150-firmware-8.24.2.2-45.2.el7_2.noarch.rpm | SHA-256: 6855b55e72ac2f5229ea0df6bf81f6f35d13f2173012593828844c888ac06b0c |
iwl6000-firmware-9.221.4.1-45.2.el7_2.noarch.rpm | SHA-256: d2de7e6a9f61e3f80a179777ea875b501c7366d406db6d7af1be580d0ce1541e |
iwl6000g2a-firmware-17.168.5.3-45.2.el7_2.noarch.rpm | SHA-256: 17f0346e52715a876e9b97c9e2cb27bd7dc274b1c45f876cff879b4413fe853a |
iwl6000g2b-firmware-17.168.5.2-45.2.el7_2.noarch.rpm | SHA-256: 62e4f0470787d665913783893a65838c90da23d38be574a53d61af7f24cbab53 |
iwl6050-firmware-41.28.5.1-45.2.el7_2.noarch.rpm | SHA-256: 0fd7e8b9ac040dbd1a1b52bbc81a939cf2b9e4e425a0b6bb7cf2fa6a54e190fb |
iwl7260-firmware-22.0.7.0-45.2.el7_2.noarch.rpm | SHA-256: 20c28a2749438829a0622fb47c1ed06a77161e1b43b57f70e5913a5cb527aa31 |
iwl7265-firmware-22.0.7.0-45.2.el7_2.noarch.rpm | SHA-256: bffa7c16974713672f3070e13adef8e5955a025d67063c90ba33dfd7ec925618 |
linux-firmware-20150904-45.2.git6ebf5d5.el7_2.noarch.rpm | SHA-256: 7e2c2d026e848ade1965c419cba2398852c5f0bd19e92e293f9ec516a8c4cc40 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.