microcode_ctl-1.17-25.4.AXS4
エラータID: AXSA:2018-2518:02
This update supersedes microcode provided by Asianux with the CVE-2017-5715
(“Spectre”) CPU branch injection vulnerability mitigation. (Historically, Asianux
has provided updated microcode, developed by our microprocessor partners, as
a customer convenience.) Further testing has uncovered problems with the
microcode provided along with the “Spectre” mitigation that could lead to system
instabilities. As a result, Asianux is providing an microcode update that
reverts to the last known good microcode version dated before 03 January 2018.
Asianux strongly recommends that customers contact their hardware provider for
the latest microcode updates.
IMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based
platforms must obtain and install updated microcode from their hardware vendor
immediately. The "Spectre" mitigation requires both an updated kernel from Red
Hat and updated microcode from your hardware vendor.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis.
Update packages.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
N/A
SRPMS
- microcode_ctl-1.17-25.4.AXS4.src.rpm
MD5: bdcfb3ddcec9ce2d6a9711d746b99c26
SHA-256: ce62e3a18b170e9a15ca7850f7b7b574b109a6a91982a99746d04945bfd4fe35
Size: 1.57 MB
Asianux Server 4 for x86
- microcode_ctl-1.17-25.4.AXS4.i686.rpm
MD5: c4e14f2c33e65094c9b8ed9d8576185c
SHA-256: 26d5f5959c733927a8ebeceef4e485827b4da3eab46dcb9ca639cff00f1362bd
Size: 1.16 MB
Asianux Server 4 for x86_64
- microcode_ctl-1.17-25.4.AXS4.x86_64.rpm
MD5: b562e4b1125d60b066e49fc7db7a164c
SHA-256: ba6ba47607a55fd742f8a9e3047829cf94d6d52e4d29c488923eecaf66ec0b8a
Size: 1.16 MB