Enhancement Advisory microcode_ctl enhancement update

Advisory: RHEA-2013:1202-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2013-09-04
Last updated on: 2013-09-04
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated microcode_ctl packages that add one enhancement are now available for
Red Hat Enterprise Linux 6.

The microcode_ctl packages provide utility code and microcode data to assist the
kernel in updating the CPU microcode at system boot time. This microcode
supports all current x86-based, Intel 64-based, and AMD64-based CPU models. It
takes advantage of the mechanism built-in to Linux that allows microcode to be
updated after a system boot. When loaded, the updated microcode corrects the
behavior of various processors, as described in processor specification updates
issued by Intel and AMD for those processors.

This update adds the following enhancement:

* The Intel CPU microcode file has been updated to version 20130808.
(BZ#1002446)

All users running x86-based, Intel 64-based or AMD64-based CPU models are
advised to upgrade to these updated packages, which add this enhancement.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
microcode_ctl-1.17-15.el6_4.src.rpm
File outdated by:  RHEA-2015:1291
    MD5: 94ac29a5717ab7fc4e906302b62f63e0
SHA-256: 5ce1695c3def5cc0cf92528ba235bb84c2cf0770c7ff9398e58ac110f3fd63b2
 
IA-32:
microcode_ctl-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2015:1291
    MD5: 0ce7c8653a7654cb4edf584af840c60a
SHA-256: a02179c3da15c7155d21f623e2c3cf55c947f35444bfcf0a301c739de2b3d48e
microcode_ctl-debuginfo-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2015:1291
    MD5: 4c5baac72b6302136d466e9a5653e545
SHA-256: 8f34ad7d65a6de676da42d10a3e64fca0e0c9a90a07c63dbcb5a5959bfa4c642
 
x86_64:
microcode_ctl-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: 049746b7f2bca6baa02001b12931821a
SHA-256: 3861ec647f09349c01f3475d10c83f65eaebab186d5060a95028098e663c81f6
microcode_ctl-debuginfo-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: a35bb8e82898e1e25f149803ca50ac59
SHA-256: 34d6b3a89527cb5f34229cb79c28a1014337ad9dcf9c9f4f81f4b2e1be1ad1ce
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
microcode_ctl-1.17-15.el6_4.src.rpm
File outdated by:  RHEA-2015:1291
    MD5: 94ac29a5717ab7fc4e906302b62f63e0
SHA-256: 5ce1695c3def5cc0cf92528ba235bb84c2cf0770c7ff9398e58ac110f3fd63b2
 
x86_64:
microcode_ctl-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: 049746b7f2bca6baa02001b12931821a
SHA-256: 3861ec647f09349c01f3475d10c83f65eaebab186d5060a95028098e663c81f6
microcode_ctl-debuginfo-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: a35bb8e82898e1e25f149803ca50ac59
SHA-256: 34d6b3a89527cb5f34229cb79c28a1014337ad9dcf9c9f4f81f4b2e1be1ad1ce
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
microcode_ctl-1.17-15.el6_4.src.rpm
File outdated by:  RHEA-2015:1291
    MD5: 94ac29a5717ab7fc4e906302b62f63e0
SHA-256: 5ce1695c3def5cc0cf92528ba235bb84c2cf0770c7ff9398e58ac110f3fd63b2
 
IA-32:
microcode_ctl-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2015:1291
    MD5: 0ce7c8653a7654cb4edf584af840c60a
SHA-256: a02179c3da15c7155d21f623e2c3cf55c947f35444bfcf0a301c739de2b3d48e
microcode_ctl-debuginfo-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2015:1291
    MD5: 4c5baac72b6302136d466e9a5653e545
SHA-256: 8f34ad7d65a6de676da42d10a3e64fca0e0c9a90a07c63dbcb5a5959bfa4c642
 
x86_64:
microcode_ctl-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: 049746b7f2bca6baa02001b12931821a
SHA-256: 3861ec647f09349c01f3475d10c83f65eaebab186d5060a95028098e663c81f6
microcode_ctl-debuginfo-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: a35bb8e82898e1e25f149803ca50ac59
SHA-256: 34d6b3a89527cb5f34229cb79c28a1014337ad9dcf9c9f4f81f4b2e1be1ad1ce
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
microcode_ctl-1.17-15.el6_4.src.rpm
File outdated by:  RHEA-2015:1291
    MD5: 94ac29a5717ab7fc4e906302b62f63e0
SHA-256: 5ce1695c3def5cc0cf92528ba235bb84c2cf0770c7ff9398e58ac110f3fd63b2
 
x86_64:
microcode_ctl-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2014:0154
    MD5: 049746b7f2bca6baa02001b12931821a
SHA-256: 3861ec647f09349c01f3475d10c83f65eaebab186d5060a95028098e663c81f6
microcode_ctl-debuginfo-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2014:0154
    MD5: a35bb8e82898e1e25f149803ca50ac59
SHA-256: 34d6b3a89527cb5f34229cb79c28a1014337ad9dcf9c9f4f81f4b2e1be1ad1ce
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
microcode_ctl-1.17-15.el6_4.src.rpm
File outdated by:  RHEA-2015:1291
    MD5: 94ac29a5717ab7fc4e906302b62f63e0
SHA-256: 5ce1695c3def5cc0cf92528ba235bb84c2cf0770c7ff9398e58ac110f3fd63b2
 
IA-32:
microcode_ctl-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2014:0154
    MD5: 0ce7c8653a7654cb4edf584af840c60a
SHA-256: a02179c3da15c7155d21f623e2c3cf55c947f35444bfcf0a301c739de2b3d48e
microcode_ctl-debuginfo-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2014:0154
    MD5: 4c5baac72b6302136d466e9a5653e545
SHA-256: 8f34ad7d65a6de676da42d10a3e64fca0e0c9a90a07c63dbcb5a5959bfa4c642
 
x86_64:
microcode_ctl-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2014:0154
    MD5: 049746b7f2bca6baa02001b12931821a
SHA-256: 3861ec647f09349c01f3475d10c83f65eaebab186d5060a95028098e663c81f6
microcode_ctl-debuginfo-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2014:0154
    MD5: a35bb8e82898e1e25f149803ca50ac59
SHA-256: 34d6b3a89527cb5f34229cb79c28a1014337ad9dcf9c9f4f81f4b2e1be1ad1ce
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
microcode_ctl-1.17-15.el6_4.src.rpm
File outdated by:  RHEA-2015:1291
    MD5: 94ac29a5717ab7fc4e906302b62f63e0
SHA-256: 5ce1695c3def5cc0cf92528ba235bb84c2cf0770c7ff9398e58ac110f3fd63b2
 
IA-32:
microcode_ctl-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2015:1291
    MD5: 0ce7c8653a7654cb4edf584af840c60a
SHA-256: a02179c3da15c7155d21f623e2c3cf55c947f35444bfcf0a301c739de2b3d48e
microcode_ctl-debuginfo-1.17-15.el6_4.i686.rpm
File outdated by:  RHEA-2015:1291
    MD5: 4c5baac72b6302136d466e9a5653e545
SHA-256: 8f34ad7d65a6de676da42d10a3e64fca0e0c9a90a07c63dbcb5a5959bfa4c642
 
x86_64:
microcode_ctl-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: 049746b7f2bca6baa02001b12931821a
SHA-256: 3861ec647f09349c01f3475d10c83f65eaebab186d5060a95028098e663c81f6
microcode_ctl-debuginfo-1.17-15.el6_4.x86_64.rpm
File outdated by:  RHEA-2015:1291
    MD5: a35bb8e82898e1e25f149803ca50ac59
SHA-256: 34d6b3a89527cb5f34229cb79c28a1014337ad9dcf9c9f4f81f4b2e1be1ad1ce
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/