From 2ae8ae86fe3069fd7de8660bd5511bec6fd884a8 Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Tue, 24 Jan 2023 14:09:21 +0000 Subject: [PATCH] import microcode_ctl-20220809-2.el8 --- SPECS/microcode_ctl.spec | 22 +++++++++++++--------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/SPECS/microcode_ctl.spec b/SPECS/microcode_ctl.spec index fd74b5c..6ea5472 100644 --- a/SPECS/microcode_ctl.spec +++ b/SPECS/microcode_ctl.spec @@ -12,8 +12,8 @@ Summary: CPU microcode updates for Intel x86 processors Name: microcode_ctl -Version: 20220207 -Release: 1.%{intel_ucode_version}.1%{?dist} +Version: %{intel_ucode_version} +Release: 2%{?dist} Epoch: 4 License: CC0 and Redistributable, no modification permitted URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files @@ -322,7 +322,7 @@ install -m 644 "%{SOURCE182}" "%{tgl_inst_dir}/disclaimer" # send the message to syslog, so it gets recorded on /var/log if [ -e /usr/bin/logger ]; then - %{check_caveats} -m -d | /usr/bin/logger -p syslog.notice -t DISCLAIMER + %{check_caveats} -m -d | /usr/bin/logger -p syslog.warning -t DISCLAIMER fi # also paste it over dmesg (some customers drop dmesg messages while # others keep them into /var/log for the later case, we'll have the @@ -433,7 +433,7 @@ rpm -qa --qf "${qf}" ${pkgs} | sort -r -n -k'3,3' | { done if [ -n "${skipped}" ]; then - skip_msg="After installation of a new version of microcode_ctl package, + skip_msg="<4>After installation of a new version of microcode_ctl package, initramfs hasn't been re-generated for all the installed kernel packages. The following kernel packages have been skipped:${skipped}. Please re-generate initramfs manually for these kernel packages with the @@ -442,7 +442,7 @@ Intel CPU microcode included into early initramfs image for it, if needed." if [ -e /usr/bin/logger ]; then echo "${skip_msg}" | - /usr/bin/logger -p syslog.notice -t microcode_ctl + /usr/bin/logger -p syslog.warning -t microcode_ctl fi if [ -e /dev/kmsg ]; then @@ -544,9 +544,13 @@ rm -rf %{buildroot} %changelog -* Tue Aug 09 2022 Eugene Syromiatnikov - 4:20220207-1.20220809.1 +* Tue Oct 25 2022 Eugene Syromiatnikov - 4:20220809-2 +- Change the logger severity level to warning to align with the kmsg one + (#2136224). + +* Tue Aug 09 2022 Eugene Syromiatnikov - 4:20220809-1 - Update Intel CPU microcode to microcode-20220510 release, addresses - CVE-2022-21233 (#2115666): + CVE-2022-21233 (#2115667): - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006d05 up to 0x2006e05; @@ -607,9 +611,9 @@ rm -rf %{buildroot} - Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up to 0x22. -* Tue May 10 2022 Eugene Syromiatnikov - 4:20220207-1.20220510.1 +* Tue May 10 2022 Eugene Syromiatnikov - 4:20220510-1 - Update Intel CPU microcode to microcode-20220510 release, addresses - CVE-2022-0005, CVE-2022-21131, CVE-2022-21136, CVE-2022-21151 (#2086742): + CVE-2022-0005, CVE-2022-21131, CVE-2022-21136, CVE-2022-21151 (#2086743): - Addition of 06-97-02/0x03 (ADL-HX C0) microcode at revision 0x1f; - Addition of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) at revision 0x1f;