" UEFI-related updates have had a history of making devices unusable, and vendors will need to be very cautious."
https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
The fix for this vulnerability is complex and the fix will have different results on different machines. The volunteers that support CentOS do the very best they can to test patches, but they can't possibly test for everything. If people have problems with the way patches are tested, maybe they should step up to the plate and become part of the solution.
We should be offering our thanks to those who donate their time and energy to supporting the CentOS project.
Andrea
-----Original Message----- From: CentOS centos-bounces@centos.org On Behalf Of Mike McCarthy, W1NR Sent: Saturday, August 1, 2020 5:42 PM To: centos@centos.org Subject: {EXTERNAL} Re: [CentOS] Boot failed on latest CentOS 7 update
CAUTION: This email originated outside of BSWH; avoid action unless you know the content is safe. Send suspicious emails as attachments to BadEmail@BSWHealth.org.
It appears that it is affecting multiple distributions including Debian and Ubuntu so it looks like the grub2 team messed up. See
https://urldefense.com/v3/__https://www.zdnet.com/article/boothole-fixes-cau...
Mike
On 8/1/2020 6:11 PM, Marc Balmer via CentOS wrote:
Am 01.08.2020 um 23:52 schrieb Leon Fauster via CentOS centos@centos.org:
Am 01.08.20 um 23:41 schrieb Kay Schenk:
Well misery loves company but still...just truly unfathomable! Time for a change.
I can only express my incomprehension for such statements!
Stay and help. Instead running away or should I say out of the frying pan and into the fire? :-)
The thing, RHEL and CentOS not properly testing updates, cost me at minimum 3-4 full working days, plus losses at customer sites.
This is really a huge failure of RHEL and CentOS.
A lot of trust has been destroyed.
-- Leon _______________________________________________ CentOS mailing list CentOS@centos.org https://urldefense.com/v3/__https://lists.centos.org/mailman/listinfo /centos__;!!JA_k2roV-A!Qbogq3YCBtqgCyV83UWwK0fOy32CkVABRN-pzz0HoElpMB _0b7TaqLKl4zPsGV6qgw$
CentOS mailing list CentOS@centos.org https://urldefense.com/v3/__https://lists.centos.org/mailman/listinfo/ centos__;!!JA_k2roV-A!Qbogq3YCBtqgCyV83UWwK0fOy32CkVABRN-pzz0HoElpMB_0 b7TaqLKl4zPsGV6qgw$
_______________________________________________ CentOS mailing list CentOS@centos.org https://urldefense.com/v3/__https://lists.centos.org/mailman/listinfo/centos...
********************************************************************** The information contained in this e-mail may be privileged and/or confidential, and protected from disclosure, and no waiver of any attorney-client, work product, or other privilege is intended. If you are the intended recipient, further disclosures are prohibited without proper authorization. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and destroy this e-mail. Any unauthorized copying, disclosure or distribution of the material in this e-mail is strictly forbidden and possibly a violation of federal or state law and regulations. The sender and Baylor Scott & White Health, and its affiliated entities, hereby expressly reserve all privileges and confidentiality that might otherwise be waived as a result of an erroneous or misdirected e-mail transmission. No employee or agent is authorized to conclude any binding agreement on behalf of Baylor Scott & White Health, or any affiliated entity, by e-mail without express written confirmation by the CEO, the Senior Vice President of Supply Chain Services or other duly authorized representative of Baylor Scott & White Health.