{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20210208-150300.4.19.1","kernel-firmware-brcm":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-ESPOS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20210208-150300.4.19.1","kernel-firmware-brcm":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20210208-150300.4.19.1","kernel-firmware-brcm":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware-all":"20210208-150300.4.19.1","kernel-firmware-amdgpu":"20210208-150300.4.19.1","kernel-firmware-ath10k":"20210208-150300.4.19.1","kernel-firmware-ath11k":"20210208-150300.4.19.1","kernel-firmware-atheros":"20210208-150300.4.19.1","kernel-firmware-bluetooth":"20210208-150300.4.19.1","kernel-firmware-bnx2":"20210208-150300.4.19.1","kernel-firmware-brcm":"20210208-150300.4.19.1","kernel-firmware-chelsio":"20210208-150300.4.19.1","kernel-firmware-dpaa2":"20210208-150300.4.19.1","kernel-firmware-i915":"20210208-150300.4.19.1","kernel-firmware-intel":"20210208-150300.4.19.1","kernel-firmware-iwlwifi":"20210208-150300.4.19.1","kernel-firmware-liquidio":"20210208-150300.4.19.1","kernel-firmware-marvell":"20210208-150300.4.19.1","kernel-firmware-media":"20210208-150300.4.19.1","kernel-firmware-mediatek":"20210208-150300.4.19.1","kernel-firmware-mellanox":"20210208-150300.4.19.1","kernel-firmware-mwifiex":"20210208-150300.4.19.1","kernel-firmware-network":"20210208-150300.4.19.1","kernel-firmware-nfp":"20210208-150300.4.19.1","kernel-firmware-nvidia":"20210208-150300.4.19.1","kernel-firmware-platform":"20210208-150300.4.19.1","kernel-firmware-prestera":"20210208-150300.4.19.1","kernel-firmware-qlogic":"20210208-150300.4.19.1","kernel-firmware-radeon":"20210208-150300.4.19.1","kernel-firmware-realtek":"20210208-150300.4.19.1","kernel-firmware-serial":"20210208-150300.4.19.1","kernel-firmware-sound":"20210208-150300.4.19.1","kernel-firmware-ti":"20210208-150300.4.19.1","kernel-firmware-ueagle":"20210208-150300.4.19.1","kernel-firmware-usb-network":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware-all":"20210208-150300.4.19.1","kernel-firmware-amdgpu":"20210208-150300.4.19.1","kernel-firmware-ath10k":"20210208-150300.4.19.1","kernel-firmware-ath11k":"20210208-150300.4.19.1","kernel-firmware-atheros":"20210208-150300.4.19.1","kernel-firmware-bluetooth":"20210208-150300.4.19.1","kernel-firmware-bnx2":"20210208-150300.4.19.1","kernel-firmware-brcm":"20210208-150300.4.19.1","kernel-firmware-chelsio":"20210208-150300.4.19.1","kernel-firmware-dpaa2":"20210208-150300.4.19.1","kernel-firmware-i915":"20210208-150300.4.19.1","kernel-firmware-intel":"20210208-150300.4.19.1","kernel-firmware-iwlwifi":"20210208-150300.4.19.1","kernel-firmware-liquidio":"20210208-150300.4.19.1","kernel-firmware-marvell":"20210208-150300.4.19.1","kernel-firmware-media":"20210208-150300.4.19.1","kernel-firmware-mediatek":"20210208-150300.4.19.1","kernel-firmware-mellanox":"20210208-150300.4.19.1","kernel-firmware-mwifiex":"20210208-150300.4.19.1","kernel-firmware-network":"20210208-150300.4.19.1","kernel-firmware-nfp":"20210208-150300.4.19.1","kernel-firmware-nvidia":"20210208-150300.4.19.1","kernel-firmware-platform":"20210208-150300.4.19.1","kernel-firmware-prestera":"20210208-150300.4.19.1","kernel-firmware-qlogic":"20210208-150300.4.19.1","kernel-firmware-radeon":"20210208-150300.4.19.1","kernel-firmware-realtek":"20210208-150300.4.19.1","kernel-firmware-serial":"20210208-150300.4.19.1","kernel-firmware-sound":"20210208-150300.4.19.1","kernel-firmware-ti":"20210208-150300.4.19.1","kernel-firmware-ueagle":"20210208-150300.4.19.1","kernel-firmware-usb-network":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-firmware":"20210208-150300.4.19.1","kernel-firmware-brcm":"20210208-150300.4.19.1","ucode-amd":"20210208-150300.4.19.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"kernel-firmware","purl":"pkg:rpm/suse/kernel-firmware&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20210208-150300.4.19.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kernel-firmware fixes the following issues:\n\nUpdate AMD ucode to 20231030 (bsc#1215831):\n\n- CVE-2022-23820: Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.\n- CVE-2021-46774: Insufficient input validation in ABL may enable a privileged attacker to perform arbitrary DRAM writes, potentially resulting in code execution and privilege escalation.\n- CVE-2023-20533: Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker using DMA to read/write from/to invalid DRAM address potentially resulting in denial-of-service.\n0 CVE-2023-20519: A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.\n- CVE-2023-20566: Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.\n- CVE-2023-20521: TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n- CVE-2021-46766: Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.\n- CVE-2022-23830: SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n- CVE-2023-20526: Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\n- CVE-2021-26345: Failure to validate the value in APCB may allow an attacker with physical access to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.\n- CVE-2023-20592: Issue with INVD instruction aka CacheWarpAttack (bsc#1215823).\n","id":"SUSE-SU-2023:4654-1","modified":"2023-12-06T10:35:24Z","published":"2023-12-06T10:35:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234654-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-26345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23820"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20519"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20526"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20592"}],"related":["CVE-2021-26345","CVE-2021-46766","CVE-2021-46774","CVE-2022-23820","CVE-2022-23830","CVE-2023-20519","CVE-2023-20521","CVE-2023-20526","CVE-2023-20533","CVE-2023-20566","CVE-2023-20592"],"summary":"Security update for kernel-firmware","upstream":["CVE-2021-26345","CVE-2021-46766","CVE-2021-46774","CVE-2022-23820","CVE-2022-23830","CVE-2023-20519","CVE-2023-20521","CVE-2023-20526","CVE-2023-20533","CVE-2023-20566","CVE-2023-20592"]}