!40 update to upstream 2.1-42. 20231114

From: @lwg-K 
Reviewed-by: @wu-leilei 
Signed-off-by: @wu-leilei
This commit is contained in:
openeuler-ci-bot 2023-11-16 07:27:36 +00:00 committed by Gitee
commit ffe2e1a647
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
3 changed files with 6 additions and 15 deletions

View File

@ -1,12 +0,0 @@
diff -Nur a/Makefile b/Makefile
--- a/Makefile 2022-08-10 02:27:01.000000000 +0800
+++ b/Makefile 2023-08-21 10:23:19.374614142 +0800
@@ -21,7 +21,7 @@
MICDIRINTEL = $(MICDIR)/intel-ucode
all:
- tar xf $(MICROCODE_INTEL) --strip 1 */intel-ucode/* */intel-ucode-with-caveats/* \
+ tar xf $(MICROCODE_INTEL) --wildcards --strip 1 */intel-ucode/* */intel-ucode-with-caveats/* \
--one-top-level=intel-ucode --strip-components=2 --backup=simple
clean:

View File

@ -1,15 +1,14 @@
%global debug_package %{nil} %global debug_package %{nil}
%define upstream_version 2.1-41 %define upstream_version 2.1-42
Name: microcode_ctl Name: microcode_ctl
Summary: Microcode update for CPU Summary: Microcode update for CPU
Version: 2.1 Version: 2.1
Release: 41 Release: 42
License: GPLv2+ and Redistributable, no modification permitted License: GPLv2+ and Redistributable, no modification permitted
URL: https://pagure.io/microcode_ctl URL: https://pagure.io/microcode_ctl
ExclusiveArch: %{ix86} x86_64 loongarch64 ExclusiveArch: %{ix86} x86_64 loongarch64
Source0: https://releases.pagure.org/microcode_ctl/%{name}-%{upstream_version}.tar.xz Source0: https://releases.pagure.org/microcode_ctl/%{name}-%{upstream_version}.tar.xz
Patch0: Fix-compilation-failure-caused-by-tar-upgrade.patch
%description %description
This is a tool to transform and deploy microcode update for x86 CPUs. This is a tool to transform and deploy microcode update for x86 CPUs.
@ -28,6 +27,10 @@ make DESTDIR=%{buildroot} PREFIX=%{_prefix} INSDIR=/usr/sbin install clean
%doc /usr/share/doc/microcode_ctl/* %doc /usr/share/doc/microcode_ctl/*
%changelog %changelog
* Wed Nov 15 2023 lwg K <weigangli99@gmail.com> - 2.1-42
- update to upstream 2.1-42. 20231114
- fix CVE-2023-23583
* Wed Aug 23 2023 yaoxin <yao_xin001@hoperun.com> - 2.1-41 * Wed Aug 23 2023 yaoxin <yao_xin001@hoperun.com> - 2.1-41
- Update to 2.1-41 for fix CVE-2022-40982,CVE-2022-38090 and CVE-2022-33196 - Update to 2.1-41 for fix CVE-2022-40982,CVE-2022-38090 and CVE-2022-33196