diff --git a/SPECS/microcode_ctl.spec b/SPECS/microcode_ctl.spec
index fd74b5c..6ea5472 100644
--- a/SPECS/microcode_ctl.spec
+++ b/SPECS/microcode_ctl.spec
@@ -12,8 +12,8 @@
 
 Summary:        CPU microcode updates for Intel x86 processors
 Name:           microcode_ctl
-Version:        20220207
-Release:        1.%{intel_ucode_version}.1%{?dist}
+Version:        %{intel_ucode_version}
+Release:        2%{?dist}
 Epoch:          4
 License:        CC0 and Redistributable, no modification permitted
 URL:            https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
@@ -322,7 +322,7 @@ install -m 644 "%{SOURCE182}" "%{tgl_inst_dir}/disclaimer"
 
 # send the message to syslog, so it gets recorded on /var/log
 if [ -e /usr/bin/logger ]; then
-	%{check_caveats} -m -d | /usr/bin/logger -p syslog.notice -t DISCLAIMER
+	%{check_caveats} -m -d | /usr/bin/logger -p syslog.warning -t DISCLAIMER
 fi
 # also paste it over dmesg (some customers drop dmesg messages while
 # others keep them into /var/log for the later case, we'll have the
@@ -433,7 +433,7 @@ rpm -qa --qf "${qf}" ${pkgs} | sort -r -n -k'3,3' | {
 	done
 
 	if [ -n "${skipped}" ]; then
-		skip_msg="After installation of a new version of microcode_ctl package,
+		skip_msg="<4>After installation of a new version of microcode_ctl package,
 initramfs hasn't been re-generated for all the installed kernel packages.
 The following kernel packages have been skipped:${skipped}.
 Please re-generate initramfs manually for these kernel packages with the
@@ -442,7 +442,7 @@ Intel CPU microcode included into early initramfs image for it, if needed."
 
 		if [ -e /usr/bin/logger ]; then
 			echo "${skip_msg}" |
-				/usr/bin/logger -p syslog.notice -t microcode_ctl
+				/usr/bin/logger -p syslog.warning -t microcode_ctl
 		fi
 
 		if [ -e /dev/kmsg ]; then
@@ -544,9 +544,13 @@ rm -rf %{buildroot}
 
 
 %changelog
-* Tue Aug 09 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220207-1.20220809.1
+* Tue Oct 25 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220809-2
+- Change the logger severity level to warning to align with the kmsg one
+  (#2136224).
+
+* Tue Aug 09 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220809-1
 - Update Intel CPU microcode to microcode-20220510 release, addresses
-  CVE-2022-21233 (#2115666):
+  CVE-2022-21233 (#2115667):
   - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
     intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006d05 up
     to 0x2006e05;
@@ -607,9 +611,9 @@ rm -rf %{buildroot}
   - Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up
     to 0x22.
 
-* Tue May 10 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220207-1.20220510.1
+* Tue May 10 2022 Eugene Syromiatnikov <esyr@redhat.com> - 4:20220510-1
 - Update Intel CPU microcode to microcode-20220510 release, addresses
-  CVE-2022-0005, CVE-2022-21131, CVE-2022-21136, CVE-2022-21151 (#2086742):
+  CVE-2022-0005, CVE-2022-21131, CVE-2022-21136, CVE-2022-21151 (#2086743):
   - Addition of 06-97-02/0x03 (ADL-HX C0) microcode at revision 0x1f;
   - Addition of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
     intel-ucode/06-97-02) at revision 0x1f;