diff --git a/Fix-compilation-failure-caused-by-tar-upgrade.patch b/Fix-compilation-failure-caused-by-tar-upgrade.patch deleted file mode 100644 index 4959ea30b2b0f914ad41c80239c98c7d040456d8..0000000000000000000000000000000000000000 --- a/Fix-compilation-failure-caused-by-tar-upgrade.patch +++ /dev/null @@ -1,12 +0,0 @@ -diff -Nur a/Makefile b/Makefile ---- a/Makefile 2022-08-10 02:27:01.000000000 +0800 -+++ b/Makefile 2023-08-21 10:23:19.374614142 +0800 -@@ -21,7 +21,7 @@ - MICDIRINTEL = $(MICDIR)/intel-ucode - - all: -- tar xf $(MICROCODE_INTEL) --strip 1 */intel-ucode/* */intel-ucode-with-caveats/* \ -+ tar xf $(MICROCODE_INTEL) --wildcards --strip 1 */intel-ucode/* */intel-ucode-with-caveats/* \ - --one-top-level=intel-ucode --strip-components=2 --backup=simple - - clean: diff --git a/microcode_ctl-2.1-41.tar.xz b/microcode_ctl-2.1-42.tar.xz similarity index 52% rename from microcode_ctl-2.1-41.tar.xz rename to microcode_ctl-2.1-42.tar.xz index 9102b0208eec353266f841efd1e41e1c915d1e87..72ed5822d3e03248023782f57e59ea9f8476c6fc 100644 Binary files a/microcode_ctl-2.1-41.tar.xz and b/microcode_ctl-2.1-42.tar.xz differ diff --git a/microcode_ctl.spec b/microcode_ctl.spec index 0c6904fec815d0596642bef8a16fc5c559576bc7..f8cbeee3d9a899b0d2e4e51386109793c2c5e374 100644 --- a/microcode_ctl.spec +++ b/microcode_ctl.spec @@ -1,15 +1,14 @@ %global debug_package %{nil} -%define upstream_version 2.1-41 +%define upstream_version 2.1-42 Name: microcode_ctl Summary: Microcode update for CPU Version: 2.1 -Release: 41 +Release: 42 License: GPLv2+ and Redistributable, no modification permitted URL: https://pagure.io/microcode_ctl ExclusiveArch: %{ix86} x86_64 loongarch64 Source0: https://releases.pagure.org/microcode_ctl/%{name}-%{upstream_version}.tar.xz -Patch0: Fix-compilation-failure-caused-by-tar-upgrade.patch %description This is a tool to transform and deploy microcode update for x86 CPUs. @@ -28,6 +27,10 @@ make DESTDIR=%{buildroot} PREFIX=%{_prefix} INSDIR=/usr/sbin install clean %doc /usr/share/doc/microcode_ctl/* %changelog +* Wed Nov 15 2023 lwg K - 2.1-42 +- update to upstream 2.1-42. 20231114 +- fix CVE-2023-23583 + * Wed Aug 23 2023 yaoxin - 2.1-41 - Update to 2.1-41 for fix CVE-2022-40982,CVE-2022-38090 and CVE-2022-33196