Bugzilla – Bug 1215831
VUL-0: kernel-firmware: various AMD CPU issues
Last modified: 2024-07-09 20:30:54 UTC
now public. https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 Can you check if AMD sent firmware update submits now?
(In reply to Marcus Meissner from comment #3) > now public. > > https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 > https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 > > Can you check if AMD sent firmware update submits now? For now I have no idea; at least, there was an update of amd-ucode on Oct 19, commit 06afd7f939c5b245b2af9e0fee13026f2aaf77fa: Author: John Allen <john.allen@amd.com> Date: Thu Oct 19 17:03:20 2023 +0000 linux-firmware: Update AMD cpu microcode * Update AMD cpu microcode for processor family 19h Key Name = AMD Microcode Signing Key (for signing microcode container files only) Key ID = F328AE73 Key Fingerprint = FC7C 6C50 5DAF CC14 7183 57CA E4BE 5339 F328 AE73 Signed-off-by: John Allen <john.allen@amd.com> But it doesn't say anything special in the log. Can you verify AMD?
from AMD: SB-4002: * This appears to be a client-only issue. We typically don't send client patches upstream (unless there is a good reason) and the recommended path to get the updated microcode is to update to the latest OEM bios.
from AMD: SB-3002: * I'm not familiar with this one, but it looks like based on the patches mentioned in the bulletin, these have been fixed upstream for quite a while now and would have been updated to a version that would have fixed the issue here: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=f79e4ba7ed345c55b72faaaa94ff7430f4b9e1aa
I updated kernel-firmware package to the latest state (20231128) for TW, SLE15-SP6 and ALP. Will backport to older releases, too.
Now amd-ucode (in kernel-firmware) got updated for SLE15-SP5, SLE15-SP4, SLE15-SP3, SLE15-SP1, SLE15, SLE12-SP4 and SLE12-SP2. Reassigned back to security team.
SUSE-SU-2023:4655-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-firmware-20190618-5.34.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-firmware-20190618-5.34.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-firmware-20190618-5.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4654-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: openSUSE Leap 15.3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Enterprise Storage 7.1 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-firmware-20210208-150300.4.19.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-firmware-20210208-150300.4.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4665-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): kernel-firmware-20200107-150100.3.40.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-firmware-20200107-150100.3.40.1 SUSE CaaS Platform 4.0 (src): kernel-firmware-20200107-150100.3.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4664-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: openSUSE Leap Micro 5.4 (src): kernel-firmware-20220509-150400.4.25.1 openSUSE Leap 15.4 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-firmware-20220509-150400.4.25.1 SUSE Linux Enterprise Micro 5.4 (src): kernel-firmware-20220509-150400.4.25.1 Basesystem Module 15-SP4 (src): kernel-firmware-20220509-150400.4.25.1 openSUSE Leap Micro 5.3 (src): kernel-firmware-20220509-150400.4.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4660-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Sources used: openSUSE Leap 15.5 (src): kernel-firmware-20230724-150500.3.9.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-firmware-20230724-150500.3.9.1 Basesystem Module 15-SP5 (src): kernel-firmware-20230724-150500.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done
SUSE-SU-2024:2376-1: An update that solves 11 vulnerabilities can now be installed. Category: security (important) Bug References: 1215823, 1215831 CVE References: CVE-2021-26345, CVE-2021-46766, CVE-2021-46774, CVE-2022-23820, CVE-2022-23830, CVE-2023-20519, CVE-2023-20521, CVE-2023-20526, CVE-2023-20533, CVE-2023-20566, CVE-2023-20592 Maintenance Incident: [SUSE:Maintenance:31664](https://smelt.suse.de/incident/31664/) Sources used: SUSE Linux Enterprise Micro 5.5 (src): kernel-firmware-20230724-150500.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.