{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20200107-150100.3.40.1","ucode-amd":"20200107-150100.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20200107-150100.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20200107-150100.3.40.1","ucode-amd":"20200107-150100.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-LTSS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20200107-150100.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20200107-150100.3.40.1","ucode-amd":"20200107-150100.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20200107-150100.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20200107-150100.3.40.1","ucode-amd":"20200107-150100.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20200107-150100.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20200107-150100.3.40.1","ucode-amd":"20200107-150100.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20200107-150100.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20200107-150100.3.40.1","ucode-amd":"20200107-150100.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20200107-150100.3.40.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kernel-firmware fixes the following issues:\n\nUpdate AMD ucode to 20231030 (bsc#1215831):\n\n- CVE-2022-23820: Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.\n- CVE-2021-46774: Insufficient input validation in ABL may enable a privileged attacker to perform arbitrary DRAM writes, potentially resulting in code execution and privilege escalation.\n- CVE-2023-20533: Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker using DMA to read/write from/to invalid DRAM address potentially resulting in denial-of-service.\n0 CVE-2023-20519: A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.\n- CVE-2023-20566: Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.\n- CVE-2023-20521: TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n- CVE-2021-46766: Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.\n- CVE-2022-23830: SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n- CVE-2023-20526: Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\n- CVE-2021-26345: Failure to validate the value in APCB may allow an attacker with physical access to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.\n- CVE-2023-20592: Issue with INVD instruction aka CacheWarpAttack (bsc#1215823).\n","id":"SUSE-SU-2023:4665-1","modified":"2023-12-06T12:35:09Z","published":"2023-12-06T12:35:09Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234665-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-26345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23820"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20519"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20526"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20592"}],"related":["CVE-2021-26345","CVE-2021-46766","CVE-2021-46774","CVE-2022-23820","CVE-2022-23830","CVE-2023-20519","CVE-2023-20521","CVE-2023-20526","CVE-2023-20533","CVE-2023-20566","CVE-2023-20592"],"summary":"Security update for kernel-firmware","upstream":["CVE-2021-26345","CVE-2021-46766","CVE-2021-46774","CVE-2022-23820","CVE-2022-23830","CVE-2023-20519","CVE-2023-20521","CVE-2023-20526","CVE-2023-20533","CVE-2023-20566","CVE-2023-20592"]}