Bug 1215831 (CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566)

Summary: VUL-0: kernel-firmware: various AMD CPU issues
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: abergmann, ali.abdallah, ddavis, rfrohl, yuliu
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/380352/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-26345:1.6:(AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) CVSSv3.1:SUSE:CVE-2021-46766:2.5:(AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N) CVSSv3.1:SUSE:CVE-2021-46774:6.7:(AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L) CVSSv3.1:SUSE:CVE-2022-23820:7.5:(AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) CVSSv3.1:SUSE:CVE-2022-23830:1.9:(AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N) CVSSv3.1:SUSE:CVE-2023-20519:6.0:(AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) CVSSv3.1:SUSE:CVE-2023-20521:3.3:(AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L) CVSSv3.1:SUSE:CVE-2023-20526:1.9:(AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N) CVSSv3.1:SUSE:CVE-2023-20533:6.1:(AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H) CVSSv3.1:SUSE:CVE-2023-20566:5.3:(AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Comment 3 Marcus Meissner 2023-11-15 07:59:42 UTC
now public.

https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002

Can you check if AMD sent firmware update submits now?
Comment 4 Takashi Iwai 2023-11-15 10:56:50 UTC
(In reply to Marcus Meissner from comment #3)
> now public.
> 
> https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002
> https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002
> 
> Can you check if AMD sent firmware update submits now?

For now I have no idea;
at least, there was an update of amd-ucode on Oct 19, commit 06afd7f939c5b245b2af9e0fee13026f2aaf77fa:

Author: John Allen <john.allen@amd.com>
Date:   Thu Oct 19 17:03:20 2023 +0000

    linux-firmware: Update AMD cpu microcode
    
    * Update AMD cpu microcode for processor family 19h
    
    Key Name        = AMD Microcode Signing Key (for signing microcode container files only)
    Key ID          = F328AE73
    Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73
    
    Signed-off-by: John Allen <john.allen@amd.com>

But it doesn't say anything special in the log.  Can you verify AMD?
Comment 5 Marcus Meissner 2023-11-29 07:54:53 UTC
from AMD:

SB-4002:
*       This appears to be a client-only issue. We typically don't send client patches upstream (unless there is a good reason) and the recommended path to get the updated microcode is to update to the latest OEM bios.
Comment 6 Marcus Meissner 2023-11-29 07:55:35 UTC
from AMD:

SB-3002:
*       I'm not familiar with this one, but it looks like based on the patches mentioned in the bulletin, these have been fixed upstream for quite a while now and would have been updated to a version that would have fixed the issue here: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=f79e4ba7ed345c55b72faaaa94ff7430f4b9e1aa
Comment 8 Takashi Iwai 2023-11-29 15:53:09 UTC
I updated kernel-firmware package to the latest state (20231128) for TW, SLE15-SP6 and ALP.

Will backport to older releases, too.
Comment 9 Takashi Iwai 2023-11-29 17:00:51 UTC
Now amd-ucode (in kernel-firmware) got updated for SLE15-SP5, SLE15-SP4, SLE15-SP3, SLE15-SP1, SLE15, SLE12-SP4 and SLE12-SP2.

Reassigned back to security team.
Comment 14 Maintenance Automation 2023-12-06 12:30:03 UTC
SUSE-SU-2023:4655-1: An update that solves 11 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215823, 1215831
CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-firmware-20190618-5.34.1
SUSE Linux Enterprise Server 12 SP5 (src): kernel-firmware-20190618-5.34.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-firmware-20190618-5.34.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2023-12-06 12:30:05 UTC
SUSE-SU-2023:4654-1: An update that solves 11 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215823, 1215831
CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592
Sources used:
openSUSE Leap 15.3 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Enterprise Storage 7.1 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise Micro 5.1 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise Micro 5.2 (src): kernel-firmware-20210208-150300.4.19.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-firmware-20210208-150300.4.19.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Maintenance Automation 2023-12-06 16:30:25 UTC
SUSE-SU-2023:4665-1: An update that solves 11 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215823, 1215831
CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): kernel-firmware-20200107-150100.3.40.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): kernel-firmware-20200107-150100.3.40.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): kernel-firmware-20200107-150100.3.40.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): kernel-firmware-20200107-150100.3.40.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): kernel-firmware-20200107-150100.3.40.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-firmware-20200107-150100.3.40.1
SUSE CaaS Platform 4.0 (src): kernel-firmware-20200107-150100.3.40.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Maintenance Automation 2023-12-06 16:30:28 UTC
SUSE-SU-2023:4664-1: An update that solves 11 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215823, 1215831
CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592
Sources used:
openSUSE Leap Micro 5.4 (src): kernel-firmware-20220509-150400.4.25.1
openSUSE Leap 15.4 (src): kernel-firmware-20220509-150400.4.25.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-firmware-20220509-150400.4.25.1
SUSE Linux Enterprise Micro 5.3 (src): kernel-firmware-20220509-150400.4.25.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-firmware-20220509-150400.4.25.1
SUSE Linux Enterprise Micro 5.4 (src): kernel-firmware-20220509-150400.4.25.1
Basesystem Module 15-SP4 (src): kernel-firmware-20220509-150400.4.25.1
openSUSE Leap Micro 5.3 (src): kernel-firmware-20220509-150400.4.25.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Maintenance Automation 2023-12-06 16:30:39 UTC
SUSE-SU-2023:4660-1: An update that solves 11 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215823, 1215831
CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592
Sources used:
openSUSE Leap 15.5 (src): kernel-firmware-20230724-150500.3.9.1
SUSE Linux Enterprise Micro 5.5 (src): kernel-firmware-20230724-150500.3.9.1
Basesystem Module 15-SP5 (src): kernel-firmware-20230724-150500.3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 20 Marcus Meissner 2024-05-17 12:16:07 UTC
done
Comment 21 Maintenance Automation 2024-07-09 20:30:54 UTC
SUSE-SU-2024:2376-1: An update that solves 11 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215823, 1215831
CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592
Maintenance Incident: [SUSE:Maintenance:31664](https://smelt.suse.de/incident/31664/)
Sources used:
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-firmware-20230724-150500.3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.