-
Tue Mar 20 2018 Todd Vierling <todd.vierling@oracle.com> - 2.1-22.5.0.8
- Remove upstream disclaimer file.
-
Mon Mar 19 2018 Todd Vierling <todd.vierling@oracle.com> - 2.1-22.5.0.7
- Update 106a5 (06-1a-05) to rev 0x1c.
- Update 206c2 (06-2c-02) to rev 0x1e.
- Update 206e6 (06-2e-06) to rev 0xc.
- Update 206f2 (06-2f-02) to rev 0x3a.
-
Mon Mar 05 2018 Todd Vierling <todd.vierling@oracle.com> - 2.1-22.5.0.6
- Update 206d7 (06-2d-07) to rev 0x713.
- Update 306e4 (06-3e-04) to rev 0x42c.
- Update 306e7 (06-3e-07) to rev 0x713.
- Update 306f4 (06-3f-04) to rev 0x11.
-
Mon Feb 26 2018 Todd Vierling <todd.vierling@oracle.com> - 2.1-22.5.0.5
- Update 306f2 (06-3f-02) to rev 0x3c.
- Update 406f1 (06-4f-01) to rev 0xb00002a.
-
Wed Feb 21 2018 Todd Vierling <todd.vierling@oracle.com> - 2.1-22.5.0.4
- Update 50654 (06-55-04) to rev 0x2000043.
-
Sat Jan 20 2018 Keshav Sharma <keshav.sharma@oracle.com> - 2.1-22.5.0.3
- Revert Intel 20180108 microcode for CPUIDs: {CVE-2017-5715}
306c3 (06-3c-03 rev 0x23, Haswell);
306d4 (06-3d-04 rev 0x28, Broadwell);
306f2 (06-3f-02 rev 0x3b, Haswell);
306f4 (06-3f-04 rev 0x10, Haswell);
306e4 (06-3e-04 rev 0x42a, Ivy Bridge);
40651 (06-45-01 rev 0x21, Haswell);
40661 (06-46-01 rev 0x18, Haswell);
40671 (06-47-01 rev 0x1b, Broadwell);
406e3 (06-4e-03 rev 0xc2, Skylake);
406f1 (06-4f-01 rev 0xb000025, Broadwell);
50654 (06-55-04 rev 0x200003c, Skylake);
50662 (06-56-02 rev 0x14, Broadwell);
50663 (06-56-03 rev 0x7000011, Broadwell);
506e3 (06-5e-03 rev 0xc2, Skylake);
706a1 (06-7a-01 rev 0x22);
806e9 (06-8e-09 rev 0x80, Kaby Lake);
806ea (06-8e-0a rev 0x80);
906e9 (06-9e-09 rev 0x80, Kaby Lake)
906ea (06-9e-0a rev 0x80);
906eb (06-9e-0b rev 0x80)
-
Wed Jan 17 2018 Todd Vierling <todd.vierling@oracle.com> - 2.1-22.5.0.2
- Add updated Intel 20180108 microcode for CPUIDs: {CVE-2017-5715}
306c3 (06-3c-03 rev 0x23, Haswell);
306d4 (06-3d-04 rev 0x28, Broadwell);
306f2 (06-3f-02 rev 0x3b, Haswell);
306f4 (06-3f-04 rev 0x10, Haswell);
306e4 (06-3e-04 rev 0x42a, Ivy Bridge);
40651 (06-45-01 rev 0x21, Haswell);
40661 (06-46-01 rev 0x18, Haswell);
40671 (06-47-01 rev 0x1b, Broadwell);
406e3 (06-4e-03 rev 0xc2, Skylake);
406f1 (06-4f-01 rev 0xb000025, Broadwell);
50654 (06-55-04 rev 0x200003c, Skylake);
50662 (06-56-02 rev 0x14, Broadwell);
50663 (06-56-03 rev 0x7000011, Broadwell);
506e3 (06-5e-03 rev 0xc2, Skylake);
706a1 (06-7a-01 rev 0x22);
806e9 (06-8e-09 rev 0x80, Kaby Lake);
806ea (06-8e-0a rev 0x80);
906e9 (06-9e-09 rev 0x80, Kaby Lake)
906ea (06-9e-0a rev 0x80);
906eb (06-9e-0b rev 0x80)
-
Mon Jan 15 2018 Petr Oros <poros@redhat.com> - 2.1-22.5
- Use right upstream source for revert
- Resolves: #1533971
-
Fri Jan 12 2018 Petr Oros <poros@redhat.com> - 2.1-22.4
- Revert Microcode from Intel for Side Channel attack
- Resolves: #1533971
-
Fri Jan 12 2018 Petr Oros <poros@redhat.com> - 2.1-22.3
- Don't run dracut if not on a live system
- Resolves: #1531453