|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: kernel-firmware: various AMD CPU issues | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | abergmann, ali.abdallah, ddavis, rfrohl, yuliu |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/380352/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2021-26345:1.6:(AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) CVSSv3.1:SUSE:CVE-2021-46766:2.5:(AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N) CVSSv3.1:SUSE:CVE-2021-46774:6.7:(AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L) CVSSv3.1:SUSE:CVE-2022-23820:7.5:(AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) CVSSv3.1:SUSE:CVE-2022-23830:1.9:(AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N) CVSSv3.1:SUSE:CVE-2023-20519:6.0:(AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) CVSSv3.1:SUSE:CVE-2023-20521:3.3:(AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L) CVSSv3.1:SUSE:CVE-2023-20526:1.9:(AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N) CVSSv3.1:SUSE:CVE-2023-20533:6.1:(AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H) CVSSv3.1:SUSE:CVE-2023-20566:5.3:(AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Comment 3
Marcus Meissner
2023-11-15 07:59:42 UTC
(In reply to Marcus Meissner from comment #3) > now public. > > https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 > https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 > > Can you check if AMD sent firmware update submits now? For now I have no idea; at least, there was an update of amd-ucode on Oct 19, commit 06afd7f939c5b245b2af9e0fee13026f2aaf77fa: Author: John Allen <john.allen@amd.com> Date: Thu Oct 19 17:03:20 2023 +0000 linux-firmware: Update AMD cpu microcode * Update AMD cpu microcode for processor family 19h Key Name = AMD Microcode Signing Key (for signing microcode container files only) Key ID = F328AE73 Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73 Signed-off-by: John Allen <john.allen@amd.com> But it doesn't say anything special in the log. Can you verify AMD? from AMD: SB-4002: * This appears to be a client-only issue. We typically don't send client patches upstream (unless there is a good reason) and the recommended path to get the updated microcode is to update to the latest OEM bios. from AMD: SB-3002: * I'm not familiar with this one, but it looks like based on the patches mentioned in the bulletin, these have been fixed upstream for quite a while now and would have been updated to a version that would have fixed the issue here: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=f79e4ba7ed345c55b72faaaa94ff7430f4b9e1aa I updated kernel-firmware package to the latest state (20231128) for TW, SLE15-SP6 and ALP. Will backport to older releases, too. Now amd-ucode (in kernel-firmware) got updated for SLE15-SP5, SLE15-SP4, SLE15-SP3, SLE15-SP1, SLE15, SLE12-SP4 and SLE12-SP2. Reassigned back to security team. SUSE-SU-2023:4655-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-firmware-20190618-5.34.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-firmware-20190618-5.34.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-firmware-20190618-5.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4654-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: openSUSE Leap 15.3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Enterprise Storage 7.1 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-firmware-20210208-150300.4.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4665-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-firmware-20200107-150100.3.40.1 SUSE CaaS Platform 4.0 (src): kernel-firmware-20200107-150100.3.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4664-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: openSUSE Leap Micro 5.4 (src): kernel-firmware-20220509-150400.4.25.1 openSUSE Leap 15.4 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro 5.4 (src): kernel-firmware-20220509-150400.4.25.1 Basesystem Module 15-SP4 (src): kernel-firmware-20220509-150400.4.25.1 openSUSE Leap Micro 5.3 (src): kernel-firmware-20220509-150400.4.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4660-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: openSUSE Leap 15.5 (src): kernel-firmware-20230724-150500.3.9.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-firmware-20230724-150500.3.9.1 Basesystem Module 15-SP5 (src): kernel-firmware-20230724-150500.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. done SUSE-SU-2024:2376-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Maintenance Incident: [SUSE:Maintenance:31664](https://smelt.suse.de/incident/31664/) Sources used: SUSE Linux Enterprise Micro 5.5 (src): kernel-firmware-20230724-150500.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |