Bug Fix Advisory microcode_ctl bug fix and enhancement update

Advisory: RHBA-2013:1668-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated microcode_ctl packages that fix one bug and add one enhancement are now
available for Red Hat Enterprise Linux 6.

The microcode_ctl packages provide utility code and microcode data to assist the
kernel in updating the CPU microcode at system boot time. This microcode
supports all current x86-based, Intel 64-based, and AMD64-based CPU models. It
takes advantage of the mechanism built-in to Linux that allows microcode to be
updated after system boot. When loaded, the updated microcode corrects the
behavior of various processors, as described in processor specification updates
issued by Intel and AMD for those processors.

This update fixes the following bug:

* Previously, the microcode_ctl utility did not detect if it was running in a
virtual machine and attempted to install the CPU microcode updates. This
behavior caused several errors to be returned in the kernel ring buffer. The
underlying source code has been modified and microcode_ctl no longer tries to
update the CPU microcode in the described scenario. (BZ#1000317)

In addition, this update adds the following enhancement:

* The Intel CPU microcode file has been updated to version 20130906. (BZ#915957,
BZ#1005606)

All users of microcode_ctl are advised to upgrade to these updated packages,
which fix this bug and add this enhancement. Note: a system reboot is
necessary for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
microcode_ctl-1.17-17.el6.src.rpm
File outdated by:  RHEA-2017:0613
    MD5: e69bd25b41989644a0232e34940efff1
SHA-256: 7627ea61b90c7a9a52c3e269aaf2d662eb884c93269599a0151e4d51b8e3f935
 
IA-32:
microcode_ctl-1.17-17.el6.i686.rpm
File outdated by:  RHEA-2017:0613
    MD5: 1721e6ea1e0d6b22922c40ade736d570
SHA-256: 30a5e641807df360ffca316745392c33857e2edf94a750771800428b6191dad7
microcode_ctl-debuginfo-1.17-17.el6.i686.rpm
File outdated by:  RHEA-2017:0613
    MD5: e14f5538818c9e0c3c3be59c46125f41
SHA-256: 64ad1ee56a8d35636c5031d4a99823b816765ba77f574f928afad04eebcb804f
 
x86_64:
microcode_ctl-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: 13ef8bf0a978a805ebc87d7fbfa3695b
SHA-256: 748165138096ba1ce716bdcfdb52fe92bd36ea6c9b4e1e039f518a2ad1f68a78
microcode_ctl-debuginfo-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: a53237d560e7d38515ae4ef7620e5f54
SHA-256: 7d036433fdff3ac1bd0563d85ae2d3ed20a3fa0126ac4df6569e18a0e3ada084
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
microcode_ctl-1.17-17.el6.src.rpm
File outdated by:  RHEA-2017:0613
    MD5: e69bd25b41989644a0232e34940efff1
SHA-256: 7627ea61b90c7a9a52c3e269aaf2d662eb884c93269599a0151e4d51b8e3f935
 
x86_64:
microcode_ctl-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: 13ef8bf0a978a805ebc87d7fbfa3695b
SHA-256: 748165138096ba1ce716bdcfdb52fe92bd36ea6c9b4e1e039f518a2ad1f68a78
microcode_ctl-debuginfo-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: a53237d560e7d38515ae4ef7620e5f54
SHA-256: 7d036433fdff3ac1bd0563d85ae2d3ed20a3fa0126ac4df6569e18a0e3ada084
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
microcode_ctl-1.17-17.el6.src.rpm
File outdated by:  RHEA-2017:0613
    MD5: e69bd25b41989644a0232e34940efff1
SHA-256: 7627ea61b90c7a9a52c3e269aaf2d662eb884c93269599a0151e4d51b8e3f935
 
IA-32:
microcode_ctl-1.17-17.el6.i686.rpm
File outdated by:  RHEA-2017:0613
    MD5: 1721e6ea1e0d6b22922c40ade736d570
SHA-256: 30a5e641807df360ffca316745392c33857e2edf94a750771800428b6191dad7
microcode_ctl-debuginfo-1.17-17.el6.i686.rpm
File outdated by:  RHEA-2017:0613
    MD5: e14f5538818c9e0c3c3be59c46125f41
SHA-256: 64ad1ee56a8d35636c5031d4a99823b816765ba77f574f928afad04eebcb804f
 
x86_64:
microcode_ctl-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: 13ef8bf0a978a805ebc87d7fbfa3695b
SHA-256: 748165138096ba1ce716bdcfdb52fe92bd36ea6c9b4e1e039f518a2ad1f68a78
microcode_ctl-debuginfo-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: a53237d560e7d38515ae4ef7620e5f54
SHA-256: 7d036433fdff3ac1bd0563d85ae2d3ed20a3fa0126ac4df6569e18a0e3ada084
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
microcode_ctl-1.17-17.el6.src.rpm
File outdated by:  RHEA-2017:0613
    MD5: e69bd25b41989644a0232e34940efff1
SHA-256: 7627ea61b90c7a9a52c3e269aaf2d662eb884c93269599a0151e4d51b8e3f935
 
IA-32:
microcode_ctl-1.17-17.el6.i686.rpm
File outdated by:  RHEA-2017:0613
    MD5: 1721e6ea1e0d6b22922c40ade736d570
SHA-256: 30a5e641807df360ffca316745392c33857e2edf94a750771800428b6191dad7
microcode_ctl-debuginfo-1.17-17.el6.i686.rpm
File outdated by:  RHEA-2017:0613
    MD5: e14f5538818c9e0c3c3be59c46125f41
SHA-256: 64ad1ee56a8d35636c5031d4a99823b816765ba77f574f928afad04eebcb804f
 
x86_64:
microcode_ctl-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: 13ef8bf0a978a805ebc87d7fbfa3695b
SHA-256: 748165138096ba1ce716bdcfdb52fe92bd36ea6c9b4e1e039f518a2ad1f68a78
microcode_ctl-debuginfo-1.17-17.el6.x86_64.rpm
File outdated by:  RHEA-2017:0613
    MD5: a53237d560e7d38515ae4ef7620e5f54
SHA-256: 7d036433fdff3ac1bd0563d85ae2d3ed20a3fa0126ac4df6569e18a0e3ada084
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1000317 - microcode update should be skipped in virtualized environment



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/