Updated microcode_ctl packages that fix one bug are now available for Red HatEnterprise Linux 7.
The microcode_ctl packages provide microcode updates for Intel and AMDprocessors.This update fixes the following bug:* The microcode_ctl package attempts a live update of the CPU’s microcode duringthe package installation. On certain CPU models (Intel Xeon v4, family 6, model79), updating microcode_ctl could previously cause the system to becomeunresponsive or reboot instantly.

As a consequence, this could leave the systemin an unbootable state and with duplicate packages in the RPM database.

To fixthis bug, the live update is skipped on the affected CPU models, and thedescribed problem no longer occurs. (BZ#1402512)Users of microcode_ctl are advised to upgrade to these updated packages, whichfix this bug. Note: a system reboot is necessary for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
microcode_ctl-2.1-16.1.el7_3.src.rpm
    MD5: a0ab0aede5593820c4aedc0b17e1d6b5SHA-256: 63ba87e4eed559f5ce0b0265e0f16ed33a2a6db7629cc08d350cd8afedf6b2c5
 
x86_64:
microcode_ctl-2.1-16.1.el7_3.x86_64.rpm
    MD5: d435974fcb8a9aa38b1a35ebaf85191bSHA-256: 6f4f750787dbbb7cf1824f9a43553d40bb409a741c5075aeed1fd8fa0c542c97
microcode_ctl-debuginfo-2.1-16.1.el7_3.x86_64.rpm
    MD5: 9ce694157572f78f99c608bbab7b3d7bSHA-256: 23b5e249e77c7cf98f6c69bb78df4f190b0a2cfad22371d4f9c329d1af4c472d
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
microcode_ctl-2.1-16.1.el7_3.src.rpm
    MD5: a0ab0aede5593820c4aedc0b17e1d6b5SHA-256: 63ba87e4eed559f5ce0b0265e0f16ed33a2a6db7629cc08d350cd8afedf6b2c5
 
x86_64:
microcode_ctl-2.1-16.1.el7_3.x86_64.rpm
    MD5: d435974fcb8a9aa38b1a35ebaf85191bSHA-256: 6f4f750787dbbb7cf1824f9a43553d40bb409a741c5075aeed1fd8fa0c542c97
microcode_ctl-debuginfo-2.1-16.1.el7_3.x86_64.rpm
    MD5: 9ce694157572f78f99c608bbab7b3d7bSHA-256: 23b5e249e77c7cf98f6c69bb78df4f190b0a2cfad22371d4f9c329d1af4c472d
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
microcode_ctl-2.1-16.1.el7_3.src.rpm
    MD5: a0ab0aede5593820c4aedc0b17e1d6b5SHA-256: 63ba87e4eed559f5ce0b0265e0f16ed33a2a6db7629cc08d350cd8afedf6b2c5
 
x86_64:
microcode_ctl-2.1-16.1.el7_3.x86_64.rpm
    MD5: d435974fcb8a9aa38b1a35ebaf85191bSHA-256: 6f4f750787dbbb7cf1824f9a43553d40bb409a741c5075aeed1fd8fa0c542c97
microcode_ctl-debuginfo-2.1-16.1.el7_3.x86_64.rpm
    MD5: 9ce694157572f78f99c608bbab7b3d7bSHA-256: 23b5e249e77c7cf98f6c69bb78df4f190b0a2cfad22371d4f9c329d1af4c472d
 
Red Hat Enterprise Linux Server TUS (v. 7.3)

SRPMS:
microcode_ctl-2.1-16.1.el7_3.src.rpm
    MD5: a0ab0aede5593820c4aedc0b17e1d6b5SHA-256: 63ba87e4eed559f5ce0b0265e0f16ed33a2a6db7629cc08d350cd8afedf6b2c5
 
x86_64:
microcode_ctl-2.1-16.1.el7_3.x86_64.rpm
    MD5: d435974fcb8a9aa38b1a35ebaf85191bSHA-256: 6f4f750787dbbb7cf1824f9a43553d40bb409a741c5075aeed1fd8fa0c542c97
microcode_ctl-debuginfo-2.1-16.1.el7_3.x86_64.rpm
    MD5: 9ce694157572f78f99c608bbab7b3d7bSHA-256: 23b5e249e77c7cf98f6c69bb78df4f190b0a2cfad22371d4f9c329d1af4c472d
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
microcode_ctl-2.1-16.1.el7_3.src.rpm
    MD5: a0ab0aede5593820c4aedc0b17e1d6b5SHA-256: 63ba87e4eed559f5ce0b0265e0f16ed33a2a6db7629cc08d350cd8afedf6b2c5
 
x86_64:
microcode_ctl-2.1-16.1.el7_3.x86_64.rpm
    MD5: d435974fcb8a9aa38b1a35ebaf85191bSHA-256: 6f4f750787dbbb7cf1824f9a43553d40bb409a741c5075aeed1fd8fa0c542c97
microcode_ctl-debuginfo-2.1-16.1.el7_3.x86_64.rpm
    MD5: 9ce694157572f78f99c608bbab7b3d7bSHA-256: 23b5e249e77c7cf98f6c69bb78df4f190b0a2cfad22371d4f9c329d1af4c472d
 
(The unlinked packages above are only available from the Red Hat Network)

1402512 – microcode_ctl update causes duplicate package problems and non-bootable system

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply