Blame SOURCES/REDHAT-DISCLAIMER

d4f8ed
d4f8ed
 This update supersedes microcode provided  by Red Hat with the CVE-2017-5715 (“Spectre”)
d4f8ed
 CPU branch injection vulnerability mitigation. (Historically, Red Hat has provided updated
d4f8ed
 microcode, developed by our microprocessor partners, as a customer convenience.) Further
d4f8ed
 testing has uncovered problems with the microcode provided along with the “Spectre” mitigation
d4f8ed
 that could lead to system instabilities. As a result, Red Hat is providing an microcode update
d4f8ed
 that reverts to the last known good microcode version dated before 03 January 2018.
d4f8ed
 Red Hat strongly recommends that customers contact their hardware provider for the latest microcode updates.
d4f8ed
d4f8ed
 IMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based platforms must obtain and
d4f8ed
 install updated microcode from their hardware vendor immediately. The "Spectre" mitigation requires
d4f8ed
 both an updated kernel from Red Hat and updated microcode from your hardware vendor.
d4f8ed