import microcode_ctl-20220809-2.el8

This commit is contained in:
CentOS Sources 2023-05-16 06:18:30 +00:00 committed by root
parent 99e4dba9c4
commit 9054cee799
1 changed files with 8 additions and 4 deletions

View File

@ -13,7 +13,7 @@
Summary: CPU microcode updates for Intel x86 processors
Name: microcode_ctl
Version: %{intel_ucode_version}
Release: 1%{?dist}
Release: 2%{?dist}
Epoch: 4
License: CC0 and Redistributable, no modification permitted
URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
@ -322,7 +322,7 @@ install -m 644 "%{SOURCE182}" "%{tgl_inst_dir}/disclaimer"
# send the message to syslog, so it gets recorded on /var/log
if [ -e /usr/bin/logger ]; then
%{check_caveats} -m -d | /usr/bin/logger -p syslog.notice -t DISCLAIMER
%{check_caveats} -m -d | /usr/bin/logger -p syslog.warning -t DISCLAIMER
fi
# also paste it over dmesg (some customers drop dmesg messages while
# others keep them into /var/log for the later case, we'll have the
@ -433,7 +433,7 @@ rpm -qa --qf "${qf}" ${pkgs} | sort -r -n -k'3,3' | {
done
if [ -n "${skipped}" ]; then
skip_msg="After installation of a new version of microcode_ctl package,
skip_msg="<4>After installation of a new version of microcode_ctl package,
initramfs hasn't been re-generated for all the installed kernel packages.
The following kernel packages have been skipped:${skipped}.
Please re-generate initramfs manually for these kernel packages with the
@ -442,7 +442,7 @@ Intel CPU microcode included into early initramfs image for it, if needed."
if [ -e /usr/bin/logger ]; then
echo "${skip_msg}" |
/usr/bin/logger -p syslog.notice -t microcode_ctl
/usr/bin/logger -p syslog.warning -t microcode_ctl
fi
if [ -e /dev/kmsg ]; then
@ -544,6 +544,10 @@ rm -rf %{buildroot}
%changelog
* Tue Oct 25 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220809-2
- Change the logger severity level to warning to align with the kmsg one
(#2136224).
* Tue Aug 09 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220809-1
- Update Intel CPU microcode to microcode-20220510 release, addresses
CVE-2022-21233 (#2115667):