The 5.3.11 stable kernel update contains a number of important security updates across the tree, including mitigations for the most recent hardware issues disclosed on Nov 12.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

sudo dnf upgrade --advisory=FEDORA-2019-68d7f68507

This update has been submitted for testing by jforbes.

a month ago

This update's test gating status has been changed to 'waiting'.

a month ago

This update's test gating status has been changed to 'ignored'.

a month ago

jforbes edited this update.

a month ago

jforbes edited this update.

a month ago
User Icon coremodule commented & provided feedback a month ago
karma

Installed, ran the kernel regression suite, all tests were PASS. WFM!

User Icon coremodule commented & provided feedback a month ago
karma

Installed, ran the kernel regression suite, all tests were PASS. WFM!

User Icon coremodule commented & provided feedback a month ago
karma

Installed, ran the kernel regression test suite, all were PASS. WFM!

User Icon kevin commented & provided feedback a month ago
karma

Worked fine on a cloud instance.

User Icon codeblock provided feedback 24 days ago
karma

This update has been submitted for stable by bodhi.

24 days ago
User Icon codeblock commented & provided feedback 24 days ago
karma

+1

This update has been submitted for stable by bodhi.

24 days ago

This update has been pushed to stable.

24 days ago

Please login to add feedback.

Metadata
Type
security
Severity
urgent
Karma
3
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Dates
submitted
a month ago
in stable
24 days ago
modified
a month ago
BZ#1646768 CVE-2018-12207 hw: Machine Check Error on Page Size Change (IPU)
0
0
BZ#1724393 CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state
0
0
BZ#1724398 CVE-2019-0155 hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
0
0
BZ#1753062 CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)
0
0
BZ#1758414 CVE-2019-0117 hw: Intel SGX information leak
0
0
BZ#1758710 make scripts fails citing classmap.h does not exist.
0
0
BZ#1771642 CVE-2019-0154 kernel: hw: Intel GPU Denial Of Service while accessing MMIO in lower power state [fedora-all]
0
0
BZ#1771644 CVE-2019-0155 kernel: hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write [fedora-all]
0
0
BZ#1771645 CVE-2018-12207 kernel: hw: Machine Check Error on Page Size Change (IPU) [fedora-all]
0
0
BZ#1771648 CVE-2019-0117 microcode_ctl: hw: Intel SGX information leak [fedora-all]
0
0
BZ#1771649 CVE-2019-11135 kernel: hw: TSX Transaction Asynchronous Abort (TAA) [fedora-all]
0
0
BZ#1771650 CVE-2019-11135 microcode_ctl: hw: TSX Transaction Asynchronous Abort (TAA) [fedora-all]
0
0
BZ#1771651 microcode_ctl: hw: Target Array Sharing side channel attack [fedora-all]
0
0
BZ#1771652 microcode_ctl: hw: VERW information leak - incomplete fix of buffer clearing for previous MDS fixes [fedora-all]
0
0
BZ#1771653 microcode_ctl: hw: SHUF instruction implementation flaw [fedora-all]
0
0
BZ#1771654 microcode_ctl: hw: Fully integrated voltage regulation error condition handling (FIVR) [fedora-all]
0
0
BZ#1771655 microcode_ctl: hw: Conditional Jump Macro-fusion (JCC) [fedora-all]
0
0
BZ#1771656 microcode_ctl: hw: EGETKEY erratum [fedora-all]
0
0
BZ#1771658 microcode_ctl: hw: EGETKEY erratum [fedora-all]
0
0
BZ#1771659 CVE-2019-11139 microcode_ctl: hw: voltage modulation technical advisory [fedora-all]
0
0

Automated Test Results

Test Cases

0 1 Test Case kernel regression
0 0 Test Case microcode update