75 lines
2.5 KiB
RPMSpec
75 lines
2.5 KiB
RPMSpec
%global debug_package %{nil}
|
|
|
|
Name: microcode_ctl
|
|
Summary: Microcode update for CPU
|
|
Version: 20240531
|
|
Release: 1
|
|
License: GPLv2+ and Redistributable, no modification permitted
|
|
URL: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
|
|
ExclusiveArch: %{ix86} x86_64 loongarch64 ppc64le
|
|
Source0: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/tags/microcode-%{version}.tar.gz
|
|
|
|
%description
|
|
This is a tool to transform and deploy microcode update for x86 CPUs.
|
|
|
|
%prep
|
|
%autosetup -n Intel-Linux-Processor-Microcode-Data-Files-tags-microcode-%{version}
|
|
rm -rf intel-ucode intel-ucode-with-caveats
|
|
|
|
%build
|
|
tar xf %{SOURCE0} --strip 1 */intel-ucode/* */intel-ucode-with-caveats/* \
|
|
--one-top-level=intel-ucode --strip-components=2 --backup=simple
|
|
|
|
%install
|
|
install -d %{buildroot}/lib/firmware/intel-ucode
|
|
install -m 644 intel-ucode/* %{buildroot}/lib/firmware/intel-ucode
|
|
rm -rf intel-ucode
|
|
|
|
%files
|
|
/lib/firmware/*
|
|
|
|
%changelog
|
|
* Tue Jun 11 2024 wangkai <13474090681@163.com> - 20240531-1
|
|
- Update to 20240531 for fix CVE-2023-45733, CVE-2023-45745,
|
|
CVE-2023-46103, CVE-2023-47855
|
|
|
|
* Thu Mar 14 2024 wangkai <13474090681@163.com> - 20240312-1
|
|
- Update to 20240312 for fix CVE-2023-38575, CVE-2023-39368,
|
|
CVE-2023-22655, CVE-2023-43490, CVE-2023-28746
|
|
|
|
* Mon Mar 4 2024 peng.zou <peng.zou@shingroup.cn> - 20231114-2
|
|
- add ppc64le support
|
|
|
|
* Tue Jan 9 2024 liyanan <liyanan61@h-partners.com> - 20231114-1
|
|
- Modify Source0 to get it form github
|
|
|
|
* Wed Nov 15 2023 lwg K <weigangli99@gmail.com> - 2.1-42
|
|
- update to upstream 2.1-42. 20231114
|
|
- fix CVE-2023-23583
|
|
|
|
* Wed Aug 23 2023 yaoxin <yao_xin001@hoperun.com> - 2.1-41
|
|
- Update to 2.1-41 for fix CVE-2022-40982,CVE-2022-38090 and CVE-2022-33196
|
|
|
|
* Mon Aug 21 2023 liyanan <thistleslyn@163.com> - 2.1-39
|
|
- Fix compilation failure caused by tar upgrade
|
|
|
|
* Mon Nov 14 2022 zhaozhen <zhaozhen@loongson.cn> - 2.1-38
|
|
- add loongarch support
|
|
|
|
* Fri Sep 23 2022 luopihui <luopihui@Ncti-gba.cn> - 2.1-37
|
|
- Upgrade to 2.1-37
|
|
- Fix CVE-2022-21233
|
|
|
|
* Tue Jul 19 2022 houyingchao <houyingchao@h-partners.com> - 2.1-36
|
|
- Upgrade to 2.1-36
|
|
- Fix CVE-2021-0146
|
|
|
|
* Thu Sep 23 2021 yaoxin <yaoxin30@huawei.com> - 2.1-33
|
|
- update version to 2.1-33, fix CVE-2020-24511 CVE-2020-24512
|
|
|
|
* Mon Dec 14 2020 zhanghua <zhanghua40@huawei.com> - 2.1-28
|
|
- update version to 2.1-31, fix CVE-2020-8695, CVE-2020-8696, CVE-2020-8698
|
|
|
|
* Thu Nov 7 2019 openEuler Buildteam <buildteam@openeuler.org> - 2.1-27
|
|
- Package init
|