Bug 2263394 (CVE-2023-20579) - CVE-2023-20579 hw: amd: SPI bypass
Summary: CVE-2023-20579 hw: amd: SPI bypass
Keywords:
Status: NEW
Alias: CVE-2023-20579
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2264236
Blocks: 2263273
TreeView+ depends on / blocked
 
Reported: 2024-02-08 17:39 UTC by Nick Tait
Modified: 2024-04-04 10:46 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Nick Tait 2024-02-08 17:39:59 UTC
A flaw found for the AMD CPU. Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

Reference:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7009.html

Comment 5 Nick Tait 2024-02-14 17:30:12 UTC
Created linux-firmware tracking bugs for this issue:

Affects: fedora-all [bug 2264236]

Comment 6 Peter Robinson 2024-02-25 14:06:31 UTC
This is a UEFI firmware update from the device vendor, not an update in linux-firmware, these should be closed out as such.


Note You need to log in before you can comment on or make changes to this bug.