Описание
ELSA-2023-12657: linux-firmware security update (CRITICAL)
[20230516-999.20.git6c9e0ed5.el7]
- cd72938cb480 linux-firmware: Update AMD fam17h cpu microcode
- 92624e57af69 linux-firmware: Update AMD cpu microcode
[20230516-999.19.git6c9e0ed5.el7]
- Rebase to upstream
- Revert removal of old iwlwifi firmwares (Orabug: 35260375)
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
iwl100-firmware
39.31.5.1-999.20.el7
iwl1000-firmware
39.31.5.1-999.20.el7
iwl105-firmware
18.168.6.1-999.20.el7
iwl135-firmware
18.168.6.1-999.20.el7
iwl2000-firmware
18.168.6.1-999.20.el7
iwl2030-firmware
18.168.6.1-999.20.el7
iwl3160-firmware
22.0.7.0-999.20.el7
iwl3945-firmware
15.32.2.9-999.20.el7
iwl4965-firmware
228.61.2.24-999.20.el7
iwl5000-firmware
8.83.5.1_1-999.20.el7
iwl5150-firmware
8.24.2.2-999.20.el7
iwl6000-firmware
9.221.4.1-999.20.el7
iwl6000g2a-firmware
17.168.5.3-999.20.el7
iwl6000g2b-firmware
17.168.5.2-999.20.el7
iwl6050-firmware
41.28.5.1-999.20.el7
iwl7260-firmware
22.0.7.0-999.20.el7
iwlax2xx-firmware
20230516-999.20.el7
linux-firmware
20230516-999.20.git6c9e0ed5.el7
Oracle Linux x86_64
iwl100-firmware
39.31.5.1-999.20.el7
iwl1000-firmware
39.31.5.1-999.20.el7
iwl105-firmware
18.168.6.1-999.20.el7
iwl135-firmware
18.168.6.1-999.20.el7
iwl2000-firmware
18.168.6.1-999.20.el7
iwl2030-firmware
18.168.6.1-999.20.el7
iwl3160-firmware
22.0.7.0-999.20.el7
iwl3945-firmware
15.32.2.9-999.20.el7
iwl4965-firmware
228.61.2.24-999.20.el7
iwl5000-firmware
8.83.5.1_1-999.20.el7
iwl5150-firmware
8.24.2.2-999.20.el7
iwl6000-firmware
9.221.4.1-999.20.el7
iwl6000g2a-firmware
17.168.5.3-999.20.el7
iwl6000g2b-firmware
17.168.5.2-999.20.el7
iwl6050-firmware
41.28.5.1-999.20.el7
iwl7260-firmware
22.0.7.0-999.20.el7
iwlax2xx-firmware
20230516-999.20.el7
linux-firmware
20230516-999.20.git6c9e0ed5.el7
Связанные CVE
Связанные уязвимости
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural ...