Bug 2306155 - CVE-2023-31315 linux-firmware: SMM Lock Bypass [fedora-all]
Summary: CVE-2023-31315 linux-firmware: SMM Lock Bypass [fedora-all]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: linux-firmware
Version: 40
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: David Woodhouse
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["5b751522-7d05-49b5-8590-3...
Depends On:
Blocks: AMD-SB-7014, CVE-2023-31315
TreeView+ depends on / blocked
 
Reported: 2024-08-20 17:28 UTC by Rohit Keshri
Modified: 2024-09-17 02:07 UTC (History)
6 users (show)

Fixed In Version: linux-firmware-20240909-1.fc40 linux-firmware-20240909-1.fc41 linux-firmware-20240909-1.fc39
Clone Of:
Environment:
Last Closed: 2024-09-11 01:25:11 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2024-08-20 17:28:35 UTC
More information about this security flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=2279283

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Fedora Update System 2024-09-09 19:05:59 UTC
FEDORA-2024-3cd42e9e29 (linux-firmware-20240909-1.fc41) has been submitted as an update to Fedora 41.
https://bodhi.fedoraproject.org/updates/FEDORA-2024-3cd42e9e29

Comment 2 Fedora Update System 2024-09-09 19:06:00 UTC
FEDORA-2024-f32e633786 (linux-firmware-20240909-1.fc40) has been submitted as an update to Fedora 40.
https://bodhi.fedoraproject.org/updates/FEDORA-2024-f32e633786

Comment 3 Fedora Update System 2024-09-09 19:06:02 UTC
FEDORA-2024-3dbf10c949 (linux-firmware-20240909-1.fc39) has been submitted as an update to Fedora 39.
https://bodhi.fedoraproject.org/updates/FEDORA-2024-3dbf10c949

Comment 4 Fedora Update System 2024-09-10 02:50:33 UTC
FEDORA-2024-f32e633786 has been pushed to the Fedora 40 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-f32e633786`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-f32e633786

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 5 Fedora Update System 2024-09-10 08:03:14 UTC
FEDORA-2024-3cd42e9e29 has been pushed to the Fedora 41 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-3cd42e9e29`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-3cd42e9e29

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 6 Fedora Update System 2024-09-10 08:13:52 UTC
FEDORA-2024-3dbf10c949 has been pushed to the Fedora 39 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-3dbf10c949`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-3dbf10c949

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 7 Fedora Update System 2024-09-11 01:25:11 UTC
FEDORA-2024-f32e633786 (linux-firmware-20240909-1.fc40) has been pushed to the Fedora 40 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 8 Fedora Update System 2024-09-17 00:15:20 UTC
FEDORA-2024-3cd42e9e29 (linux-firmware-20240909-1.fc41) has been pushed to the Fedora 41 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 9 Fedora Update System 2024-09-17 02:07:41 UTC
FEDORA-2024-3dbf10c949 (linux-firmware-20240909-1.fc39) has been pushed to the Fedora 39 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.