--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2022-d4e9b48c48
2022-08-12 01:36:16.610806
--------------------------------------------------------------------------------Name        : microcode_ctl
Product     : Fedora 36
Version     : 2.1
Release     : 51.1.fc36
URL         : https://pagure.io/microcode_ctl
Summary     : Tool to transform and deploy CPU microcode update for x86
Description :
The microcode_ctl utility is a companion to the microcode driver written
by Tigran Aivazian .

The microcode update is volatile and needs to be uploaded on each system
boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts
back to the old microcode.

--------------------------------------------------------------------------------Update Information:

- Update to upstream 2.1-37. 20220809   - Update of 06-55-03/0x97 (SKX-SP B1)
microcode from revision 0x100015d     up to 0x100015e;   - Update of
06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode from     revision 0x2006d05
up to 0x2006e05;   - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision
0xd000363     up to 0xd000375;   - Update of 06-7a-01/0x01 (GLK B0) microcode
from revision 0x3a up     to 0x3c;   - Update of 06-7a-08/0x01 (GLK-R R0)
microcode from revision 0x1e up     to 0x20;   - Update of 06-7e-05/0x80
(ICL-U/Y D1) microcode from revision 0xb0     up to 0xb2;   - Update of
06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up     to 0x28;   - Update
of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up     to 0x40;   -Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision     0x1f up to
0x22;   - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in     intel-ucode/06-97-02) from revision 0x1f up to 0x22;   - Update of 06-bf-02/0x03 (ADL
C0) microcode (in intel-ucode/06-97-02)     from revision 0x1f up to 0x22;   -Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)     from
revision 0x1f up to 0x22;   - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0)
microcode (in     intel-ucode/06-97-05) from revision 0x1f up to 0x22;   -Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f     up to
0x22;   - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x1f up to 0x22;   - Update of 06-bf-05/0x03 (ADL C0) microcode
(in intel-ucode/06-97-05)     from revision 0x1f up to 0x22;   - Update of
06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision     0x41c up to
0x421;   - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in     intel-ucode/06-9a-03) from revision 0x41c up to 0x421;   - Update of 06-9a-03/0x80
(ADL-P 6+8/U 9W L0/R0) microcode (in     intel-ucode/06-9a-04) from revision
0x41c up to 0x421;   - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from
revision 0x41c     up to 0x421;   - Update of 06-a7-01/0x02 (RKL-S B0) microcode
from revision 0x53 up     to 0x54;   - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0)
microcode (in     intel-ucode/06-bf-02) from revision 0x1f up to 0x22;   -Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in     intel-ucode/06-bf-02)
from revision 0x1f up to 0x22;   - Update of 06-bf-02/0x03 (ADL C0) microcode
from revision 0x1f up     to 0x22;   - Update of 06-bf-05/0x03 (ADL C0)
microcode (in intel-ucode/06-bf-02)     from revision 0x1f up to 0x22;   -Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in     intel-ucode/06-bf-05) from revision 0x1f up to 0x22;   - Update of 06-97-05/0x03
(ADL-S 6+0 K0) microcode (in     intel-ucode/06-bf-05) from revision 0x1f up to
0x22;   - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x1f up to 0x22;   - Update of 06-bf-05/0x03 (ADL C0) microcode
from revision 0x1f up     to 0x22. - Addresses CVE-2022-21233
--------------------------------------------------------------------------------ChangeLog:

* Tue Aug  9 2022 Eugene Syromiatnikov  2:2.1-51.1
- Update to upstream 2.1-37. 20220809
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015d
    up to 0x100015e;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode from
    revision 0x2006d05 up to 0x2006e05;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000363
    up to 0xd000375;
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3a up
    to 0x3c;
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1e up
    to 0x20;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb0
    up to 0xb2;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up
    to 0x28;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up
    to 0x40;
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision
    0x1f up to 0x22;
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-97-02) from revision 0x1f up to 0x22;
  - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x1f up to 0x22;
  - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x1f up to 0x22;
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-97-05) from revision 0x1f up to 0x22;
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f
    up to 0x22;
  - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x1f up to 0x22;
  - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x1f up to 0x22;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
    0x41c up to 0x421;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
    intel-ucode/06-9a-03) from revision 0x41c up to 0x421;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    intel-ucode/06-9a-04) from revision 0x41c up to 0x421;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x41c
    up to 0x421;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x53 up
    to 0x54;
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-02) from revision 0x1f up to 0x22;
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-02) from revision 0x1f up to 0x22;
  - Update of 06-bf-02/0x03 (ADL C0) microcode from revision 0x1f up
    to 0x22;
  - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-bf-02)
    from revision 0x1f up to 0x22;
  - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-05) from revision 0x1f up to 0x22;
  - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-05) from revision 0x1f up to 0x22;
  - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05)
    from revision 0x1f up to 0x22;
  - Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up
    to 0x22.
- Addresses CVE-2022-21233
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-d4e9b48c48' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam, report it: https://pagure.io/login/

Fedora 36: microcode_ctl 2022-d4e9b48c48

August 11, 2022
- Update to upstream 2.1-37

Summary

The microcode_ctl utility is a companion to the microcode driver written

by Tigran Aivazian .

The microcode update is volatile and needs to be uploaded on each system

boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts

back to the old microcode.

- Update to upstream 2.1-37. 20220809 - Update of 06-55-03/0x97 (SKX-SP B1)

microcode from revision 0x100015d up to 0x100015e; - Update of

06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode from revision 0x2006d05

up to 0x2006e05; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision

0xd000363 up to 0xd000375; - Update of 06-7a-01/0x01 (GLK B0) microcode

from revision 0x3a up to 0x3c; - Update of 06-7a-08/0x01 (GLK-R R0)

microcode from revision 0x1e up to 0x20; - Update of 06-7e-05/0x80

(ICL-U/Y D1) microcode from revision 0xb0 up to 0xb2; - Update of

06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up to 0x28; - Update

of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up to 0x40; -Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision 0x1f up to

0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL

C0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; -Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02) from

revision 0x1f up to 0x22; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0)

microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; -Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f up to

0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)

from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode

(in intel-ucode/06-97-05) from revision 0x1f up to 0x22; - Update of

06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x41c up to

0x421; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x41c up to 0x421; - Update of 06-9a-03/0x80

(ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision

0x41c up to 0x421; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from

revision 0x41c up to 0x421; - Update of 06-a7-01/0x02 (RKL-S B0) microcode

from revision 0x53 up to 0x54; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0)

microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; -Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02)

from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode

from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0)

microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; -Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-97-05/0x03

(ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to

0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05)

from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode

from revision 0x1f up to 0x22. - Addresses CVE-2022-21233

* Tue Aug 9 2022 Eugene Syromiatnikov 2:2.1-51.1

- Update to upstream 2.1-37. 20220809

- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015d

up to 0x100015e;

- Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode from

revision 0x2006d05 up to 0x2006e05;

- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000363

up to 0xd000375;

- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3a up

to 0x3c;

- Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1e up

to 0x20;

- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb0

up to 0xb2;

- Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up

to 0x28;

- Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up

to 0x40;

- Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision

0x1f up to 0x22;

- Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in

intel-ucode/06-97-02) from revision 0x1f up to 0x22;

- Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)

from revision 0x1f up to 0x22;

- Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02)

from revision 0x1f up to 0x22;

- Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in

intel-ucode/06-97-05) from revision 0x1f up to 0x22;

- Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f

up to 0x22;

- Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)

from revision 0x1f up to 0x22;

- Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-05)

from revision 0x1f up to 0x22;

- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision

0x41c up to 0x421;

- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in

intel-ucode/06-9a-03) from revision 0x41c up to 0x421;

- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in

intel-ucode/06-9a-04) from revision 0x41c up to 0x421;

- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x41c

up to 0x421;

- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x53 up

to 0x54;

- Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in

intel-ucode/06-bf-02) from revision 0x1f up to 0x22;

- Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in

intel-ucode/06-bf-02) from revision 0x1f up to 0x22;

- Update of 06-bf-02/0x03 (ADL C0) microcode from revision 0x1f up

to 0x22;

- Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-bf-02)

from revision 0x1f up to 0x22;

- Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in

intel-ucode/06-bf-05) from revision 0x1f up to 0x22;

- Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in

intel-ucode/06-bf-05) from revision 0x1f up to 0x22;

- Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05)

from revision 0x1f up to 0x22;

- Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up

to 0x22.

- Addresses CVE-2022-21233

su -c 'dnf upgrade --advisory FEDORA-2022-d4e9b48c48' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Do not reply to spam, report it: https://pagure.io/login/

FEDORA-2022-d4e9b48c48 2022-08-12 01:36:16.610806 Product : Fedora 36 Version : 2.1 Release : 51.1.fc36 URL : https://pagure.io/microcode_ctl Summary : Tool to transform and deploy CPU microcode update for x86 Description : The microcode_ctl utility is a companion to the microcode driver written by Tigran Aivazian . The microcode update is volatile and needs to be uploaded on each system boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts back to the old microcode. - Update to upstream 2.1-37. 20220809 - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015d up to 0x100015e; - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode from revision 0x2006d05 up to 0x2006e05; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000363 up to 0xd000375; - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3a up to 0x3c; - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1e up to 0x20; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb0 up to 0xb2; - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up to 0x28; - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up to 0x40; -Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision 0x1f up to 0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; -Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; -Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x41c up to 0x421; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x41c up to 0x421; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x41c up to 0x421; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x41c up to 0x421; - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x53 up to 0x54; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; -Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; -Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up to 0x22. - Addresses CVE-2022-21233 * Tue Aug 9 2022 Eugene Syromiatnikov 2:2.1-51.1 - Update to upstream 2.1-37. 20220809 - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015d up to 0x100015e; - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode from revision 0x2006d05 up to 0x2006e05; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000363 up to 0xd000375; - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3a up to 0x3c; - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x1e up to 0x20; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb0 up to 0xb2; - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x26 up to 0x28; - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x3e up to 0x40; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode from revision 0x1f up to 0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x1f up to 0x22; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x1f up to 0x22; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x41c up to 0x421; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x41c up to 0x421; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x41c up to 0x421; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x41c up to 0x421; - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x53 up to 0x54; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x1f up to 0x22; - Update of 06-97-02/0x03 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-97-05/0x03 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-bf-02/0x03 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x1f up to 0x22; - Update of 06-bf-05/0x03 (ADL C0) microcode from revision 0x1f up to 0x22. - Addresses CVE-2022-21233 su -c 'dnf upgrade --advisory FEDORA-2022-d4e9b48c48' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam, report it: https://pagure.io/login/

Change Log

References

Update Instructions

Severity
Product : Fedora 36
Version : 2.1
Release : 51.1.fc36
URL : https://pagure.io/microcode_ctl
Summary : Tool to transform and deploy CPU microcode update for x86

Related News