Bug 2264235 - CVE-2023-20577 linux-firmware: hw: amd: SPI flash RCE [fedora-all]
Summary: CVE-2023-20577 linux-firmware: hw: amd: SPI flash RCE [fedora-all]
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: linux-firmware
Version: 39
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: David Woodhouse
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: CVE-2023-20577
TreeView+ depends on / blocked
 
Reported: 2024-02-14 17:29 UTC by Nick Tait
Modified: 2024-02-25 14:05 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2024-02-25 14:05:21 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Nick Tait 2024-02-14 17:29:05 UTC
More information about this security flaw is available in the following bug:

http://bugzilla.redhat.com/show_bug.cgi?id=2263392

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Nick Tait 2024-02-14 17:29:08 UTC
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug.  This will ensure that all associated bugs get updated
when new packages are pushed to stable.

=====

# bugfix, security, enhancement, newpackage (required)
type=security

# low, medium, high, urgent (required)
severity=high

# testing, stable
request=testing

# Bug numbers: 1234,9876
bugs=2263392,2264235

# Description of your update
notes=Security fix for [PUT CVEs HERE]

# Enable request automation based on the stable/unstable karma thresholds
autokarma=True
stable_karma=3
unstable_karma=-3

# Automatically close bugs when this marked as stable
close_bugs=True

# Suggest that users restart after update
suggest_reboot=False

======

Additionally, you may opt to use the bodhi web interface to submit updates:

https://bodhi.fedoraproject.org/updates/new

Comment 2 Peter Robinson 2024-02-14 19:16:36 UTC
Hi Nick, I think all of these are actual system firmware, not linux-firmware, as far as I can tell from the upstream report from AMD. Can you please confirm?

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7009.html

Comment 3 Nick Tait 2024-02-14 22:22:25 UTC
Possible, but I'm not certain. Lets consult with Alex.

Comment 4 Alex 2024-02-18 09:35:23 UTC
(In reply to Peter Robinson from comment #2)
> Hi Nick, I think all of these are actual system firmware, not
> linux-firmware, as far as I can tell from the upstream report from AMD. Can
> you please confirm?
> 
> https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7009.html

In related Doc AMD said before: "AMD plans to release the platform initialization firmware versions" (and likely already released).
I think it is "linux-firmware" being loaded to the CPU during system boot.

Comment 5 Peter Robinson 2024-02-18 11:30:18 UTC
> > https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7009.html
> 
> In related Doc AMD said before: "AMD plans to release the platform
> initialization firmware versions" (and likely already released).
> I think it is "linux-firmware" being loaded to the CPU during system boot.

Generally "platform initialization firmware" would be very early boot, AKA the UEFI system firmware, it also mentions access to the SPI flash, which is where the system firmware is stored, and that needs to be blocked long before the OS begins to boot else it could be compromised long before Linux loads the CPU microcode (and it's generally not something you'd patch in microcode) or someone could even block the microcode load.

Can we get clarification from whoever supplied the AMD Doc.

Comment 6 Nick Tait 2024-02-19 22:47:38 UTC
Sure, I just reached out to AMD. Waiting to hear back.

Comment 7 Nick Tait 2024-02-23 17:16:00 UTC
Confirmed as UEFI.

Comment 8 Peter Robinson 2024-02-25 14:05:21 UTC
This is a UEFI firmware update from the device vendor, not an update in linux-firmware.


Note You need to log in before you can comment on or make changes to this bug.