Comments

60 Comments
karma

Works perfectly, and firmware was updated succesfully.

[root@crime puiterwijk]# pesign -S -i /boot/efi/EFI/fedora/fwupdx64.efi

certificate address is 0x7f5db975c198 Content was not encrypted. Content is detached; signature cannot be verified. The signer's common name is Fedora Secure Boot Signer

karma

This build has fwupd unsigned because @adamwill is not allowed to build signed things or this went to the wrong channel.

[root@crime fedora]# pesign -S -i fwupdx64.efi

certificate address is 0x7f89a1d71198 Content was not encrypted. Content is detached; signature cannot be verified. The signer's common name is Red Hat Test Certificate

https://xkcd.com/937/

Installed an f30 guest with host-passthrough CPU type on an f28 host with this update, and the guest return "Mitigation: Clear CPU buffers; SMT Host state unknown". So the VM works, and md_clear is made visible to the guest.

BZ#1646781 CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)
BZ#1646784 CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)
BZ#1667782 CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
BZ#1705312 CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
BZ#1709977 CVE-2018-12126 libvirt: hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) [fedora-all]
BZ#1709979 CVE-2018-12127 libvirt: hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) [fedora-all]
BZ#1709984 CVE-2019-11091 libvirt: hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) [fedora-all]
BZ#1709997 CVE-2018-12130 libvirt: hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) [fedora-all]
BZ#1710002 CVE-2018-12126 qemu: hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) [fedora-all]
BZ#1710003 CVE-2018-12130 qemu: hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) [fedora-all]
BZ#1710004 CVE-2018-12127 qemu: hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) [fedora-all]
BZ#1710006 CVE-2019-11091 qemu: hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) [fedora-all]

Installed an f30 guest with host-passthrough CPU type on an f28 host with this update, and the guest return "Mitigation: Clear CPU buffers; SMT Host state unknown". So the VM works, and md_clear is made visible to the guest.

BZ#1646781 CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)
BZ#1646784 CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)
BZ#1667782 CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
BZ#1705312 CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
BZ#1709977 CVE-2018-12126 libvirt: hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) [fedora-all]
BZ#1709979 CVE-2018-12127 libvirt: hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) [fedora-all]
BZ#1709984 CVE-2019-11091 libvirt: hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) [fedora-all]
BZ#1709997 CVE-2018-12130 libvirt: hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) [fedora-all]
BZ#1710002 CVE-2018-12126 qemu: hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) [fedora-all]
BZ#1710003 CVE-2018-12130 qemu: hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) [fedora-all]
BZ#1710004 CVE-2018-12127 qemu: hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) [fedora-all]
BZ#1710006 CVE-2019-11091 qemu: hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) [fedora-all]
BZ#1689648 bcm283x-firmware-20190212-1.83977fe.fc29.armv7hl fails to boot on rpi2
BZ#1622760 Console login as FreeIPA domain user fails in current Fedora Rawhide / 29
karma

Curl works, and GOAWAY is handled correctly.

Fixes the reproducer for the libgcrypt fips rng bug.

@zbyszek The answer about the Severity field: It was not set when the update was filed, I have updated this to Urgent after looking at the security teams' assessment of the attached security bugs to make sure it went out.

Yes, this update was revoked.

This fixes the overwrite problem in upstream bug #7.

karma

This fixes the overwrite problem in upstream bug #7.