microcode_ctl-2.1-22.5.el7

エラータID: AXSA:2018-2519:02

Release date: 
Monday, January 22, 2018 - 10:57
Subject: 
microcode_ctl-2.1-22.5.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

This update supersedes microcode provided by Asianux with the CVE-2017-5715
(“Spectre”) CPU branch injection vulnerability mitigation. (Historically, Asianux
has provided updated microcode, developed by our microprocessor partners, as
a customer convenience.) Further testing has uncovered problems with the
microcode provided along with the “Spectre” mitigation that could lead to system
instabilities. As a result, Asianux is providing an microcode update that
reverts to the last known good microcode version dated before 03 January 2018.
Asianux strongly recommends that customers contact their hardware provider for
the latest microcode updates.

IMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based
platforms must obtain and install updated microcode from their hardware vendor
immediately. The "Spectre" mitigation requires both an updated kernel from Red
Hat and updated microcode from your hardware vendor.

CVE-2017-5715
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. microcode_ctl-2.1-22.5.el7.src.rpm
    MD5: 450f428f0675a9292a92713e31b1c7c0
    SHA-256: 3f93b3e537fb082fb983e3c9c6a5a68b6b036b3c5c6f5d9dcf3da05ae21c1d35
    Size: 1.25 MB

Asianux Server 7 for x86_64
  1. microcode_ctl-2.1-22.5.el7.x86_64.rpm
    MD5: a876e8bcfcb6fa32f43881ef3c025aaa
    SHA-256: 10bad4d7fd71f48c717f6423dcc06a56e99a2b4229f8ee50b04369b613514ace
    Size: 785.16 kB