for url, title in item["references"].items():
tmp += ["- [{}]({})".format(title, url)]
txt += ["\n".join(tmp)]
+ if "requires" in item:
+ txt += ["**Hardware requirements:**"]
+ if "CPUID\\VID_GenuineIntel" in item["requires"]:
+ txt += ["This attribute will only be available when using Intel CPUs."]
+ elif "CPUID\\VID_AuthenticAMD" in item["requires"]:
+ txt += ["This attribute will only be available when using AMD CPUs."]
if "more-information" in item:
txt += ["**More information:**"]
for para in item["more-information"]:
"https://www.amd.com/en/technologies/pro-security": "AMD Secure Processor",
"https://forums.lenovo.com/t5/Fedora/AMD-Rollback-protection-not-detected-by-fwupd-on-T14-G3-AMD/m-p/5182708?page=1#5810366": "Loading OS Optimized Defaults on Lenovo systems"
},
+ "requires": [
+ "CPUID\\VID_AuthenticAMD"
+ ],
"fwupd-version": "1.8.0"
}
"enabled": "SPI protections enabled"
},
"hsi-level": 2,
+ "requires": [
+ "CPUID\\VID_AuthenticAMD"
+ ],
"fwupd-version": "1.8.0"
}
"enabled": "SPI protections enabled"
},
"hsi-level": 3,
+ "requires": [
+ "CPUID\\VID_AuthenticAMD"
+ ],
"fwupd-version": "1.8.0"
}
"valid": "ACM protected"
},
"hsi-level": 2,
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://github.com/coreboot/coreboot/blob/master/src/soc/intel/jasperlake/include/soc/me.h": "Coreboot documentation"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"valid": "SOC is locked"
},
"hsi-level": 2,
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"valid": "error enforce policy is set to shutdown"
},
"hsi-level": 3,
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"success": "verified boot chain"
},
"hsi-level": 2,
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf": "Intel CET Technology Preview"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf": "Intel CET Technology Preview"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention": "SMAP Wikipedia Page"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"https://github.com/phretor/intel-leak-checker/": "Intel leak checker",
"https://www.tomshardware.com/news/intel-confirms-6gb-alder-lake-bios-source-code-leak-new-details-emerge": "Tom's Hardware Article"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.8.7"
}
"https://malware.news/t/intel-me-manufacturing-mode-obscured-dangers-and-their-relationship-to-apple-macbook-vulnerability-cve-2018-4251/23214": "ME Manufacturing Mode: obscured dangers",
"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00086.html": "Intel security advisory SA-00086"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://chromium.googlesource.com/chromiumos/third_party/flashrom/+/master/Documentation/mysteries_intel.txt": "Chromium documentation for Intel ME"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"CVE-2017-5711",
"CVE-2017-5712"
],
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://www.intel.com/content/dam/www/public/us/en/documents/datasheets/6-chipset-c200-chipset-datasheet.pdf": "Intel C200 Datasheet"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"references": {
"https://www.intel.com/content/dam/www/public/us/en/documents/datasheets/6-chipset-c200-chipset-datasheet.pdf": "Intel C200 Datasheet"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}
"locked": "the SPI BAR is locked and read only from all regions"
},
"hsi-level": 1,
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.6.0"
}
"references": {
"https://www.intel.com/content/dam/www/public/us/en/documents/datasheets/6-chipset-c200-chipset-datasheet.pdf": "Intel C200 Datasheet"
},
+ "requires": [
+ "CPUID\\VID_GenuineIntel"
+ ],
"fwupd-version": "1.5.0"
}