|
|
080f4b |
This updated microcode supersedes microcode provided by Red Hat with
|
|
|
080f4b |
the CVE-2017-5715 (“Spectre”) CPU branch injection vulnerability
|
|
|
080f4b |
mitigation.
|
|
|
080f4b |
Historically, Red Hat has provided updated microcode, developed by our
|
|
|
080f4b |
microprocessor partners, as a customer convenience. Red Hat had
|
|
|
080f4b |
temporarily suspended this practice while microcode stabilized. Red
|
|
|
080f4b |
Hat is once again providing an updated Intel microcode package
|
|
|
080f4b |
(microcode_ctl) and AMD microcode package (linux-firmware) to customers
|
|
|
080f4b |
in order to simplify deployment processes and minimize downtime. We’ll
|
|
|
080f4b |
continue to update these microcode packages as necessary. Please
|
|
|
080f4b |
contact your hardware vendor to determine whether more recent
|
|
|
080f4b |
BIOS/firmware updates are recommended because additional improvements
|
|
|
080f4b |
may be available.
|
|
|
080f4b |
This kbase https://access.redhat.com/articles/3436091 includes a table
|
|
|
080f4b |
that maps Intel and AMD CPU processor code family names to updated
|
|
|
080f4b |
Intel and AMD microcode package versions.
|