Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:3298-1

Опубликовано: 11 авг. 2023
Источник: suse-cvrf

Описание

Security update for kernel-firmware

This update for kernel-firmware fixes the following issues:

  • CVE-2023-20569: Fixed AMD 19h ucode to mitigate a side channel vulnerability in some of the AMD CPUs. (bsc#1213287)

Список пакетов

Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
kernel-firmware-bnx2-20230724-150500.3.6.1
kernel-firmware-chelsio-20230724-150500.3.6.1
kernel-firmware-i915-20230724-150500.3.6.1
kernel-firmware-intel-20230724-150500.3.6.1
kernel-firmware-liquidio-20230724-150500.3.6.1
kernel-firmware-marvell-20230724-150500.3.6.1
kernel-firmware-mediatek-20230724-150500.3.6.1
kernel-firmware-mellanox-20230724-150500.3.6.1
kernel-firmware-network-20230724-150500.3.6.1
kernel-firmware-platform-20230724-150500.3.6.1
kernel-firmware-qlogic-20230724-150500.3.6.1
kernel-firmware-realtek-20230724-150500.3.6.1
kernel-firmware-usb-network-20230724-150500.3.6.1
Container suse/sle-micro/5.5:latest
kernel-firmware-all-20230724-150500.3.6.1
kernel-firmware-amdgpu-20230724-150500.3.6.1
kernel-firmware-ath10k-20230724-150500.3.6.1
kernel-firmware-ath11k-20230724-150500.3.6.1
kernel-firmware-atheros-20230724-150500.3.6.1
kernel-firmware-bluetooth-20230724-150500.3.6.1
kernel-firmware-bnx2-20230724-150500.3.6.1
kernel-firmware-brcm-20230724-150500.3.6.1
kernel-firmware-chelsio-20230724-150500.3.6.1
kernel-firmware-dpaa2-20230724-150500.3.6.1
kernel-firmware-i915-20230724-150500.3.6.1
kernel-firmware-intel-20230724-150500.3.6.1
kernel-firmware-iwlwifi-20230724-150500.3.6.1
kernel-firmware-liquidio-20230724-150500.3.6.1
kernel-firmware-marvell-20230724-150500.3.6.1
kernel-firmware-media-20230724-150500.3.6.1
kernel-firmware-mediatek-20230724-150500.3.6.1
kernel-firmware-mellanox-20230724-150500.3.6.1
kernel-firmware-mwifiex-20230724-150500.3.6.1
kernel-firmware-network-20230724-150500.3.6.1
kernel-firmware-nfp-20230724-150500.3.6.1
kernel-firmware-nvidia-20230724-150500.3.6.1
kernel-firmware-platform-20230724-150500.3.6.1
kernel-firmware-prestera-20230724-150500.3.6.1
kernel-firmware-qcom-20230724-150500.3.6.1
kernel-firmware-qlogic-20230724-150500.3.6.1
kernel-firmware-radeon-20230724-150500.3.6.1
kernel-firmware-realtek-20230724-150500.3.6.1
kernel-firmware-serial-20230724-150500.3.6.1
kernel-firmware-sound-20230724-150500.3.6.1
kernel-firmware-ti-20230724-150500.3.6.1
kernel-firmware-ueagle-20230724-150500.3.6.1
kernel-firmware-usb-network-20230724-150500.3.6.1
Image SLES15-SP5-SAP-Azure-LI-BYOS
kernel-firmware-20230724-150500.3.6.1
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
kernel-firmware-20230724-150500.3.6.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS
kernel-firmware-20230724-150500.3.6.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
kernel-firmware-20230724-150500.3.6.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
kernel-firmware-all-20230724-150500.3.6.1
kernel-firmware-amdgpu-20230724-150500.3.6.1
kernel-firmware-ath10k-20230724-150500.3.6.1
kernel-firmware-ath11k-20230724-150500.3.6.1
kernel-firmware-atheros-20230724-150500.3.6.1
kernel-firmware-bluetooth-20230724-150500.3.6.1
kernel-firmware-bnx2-20230724-150500.3.6.1
kernel-firmware-brcm-20230724-150500.3.6.1
kernel-firmware-chelsio-20230724-150500.3.6.1
kernel-firmware-dpaa2-20230724-150500.3.6.1
kernel-firmware-i915-20230724-150500.3.6.1
kernel-firmware-intel-20230724-150500.3.6.1
kernel-firmware-iwlwifi-20230724-150500.3.6.1
kernel-firmware-liquidio-20230724-150500.3.6.1
kernel-firmware-marvell-20230724-150500.3.6.1
kernel-firmware-media-20230724-150500.3.6.1
kernel-firmware-mediatek-20230724-150500.3.6.1
kernel-firmware-mellanox-20230724-150500.3.6.1
kernel-firmware-mwifiex-20230724-150500.3.6.1
kernel-firmware-network-20230724-150500.3.6.1
kernel-firmware-nfp-20230724-150500.3.6.1
kernel-firmware-nvidia-20230724-150500.3.6.1
kernel-firmware-platform-20230724-150500.3.6.1
kernel-firmware-prestera-20230724-150500.3.6.1
kernel-firmware-qcom-20230724-150500.3.6.1
kernel-firmware-qlogic-20230724-150500.3.6.1
kernel-firmware-radeon-20230724-150500.3.6.1
kernel-firmware-realtek-20230724-150500.3.6.1
kernel-firmware-serial-20230724-150500.3.6.1
kernel-firmware-sound-20230724-150500.3.6.1
kernel-firmware-ti-20230724-150500.3.6.1
kernel-firmware-ueagle-20230724-150500.3.6.1
kernel-firmware-usb-network-20230724-150500.3.6.1
ucode-amd-20230724-150500.3.6.1
openSUSE Leap 15.5
kernel-firmware-20230724-150500.3.6.1
kernel-firmware-all-20230724-150500.3.6.1
kernel-firmware-amdgpu-20230724-150500.3.6.1
kernel-firmware-ath10k-20230724-150500.3.6.1
kernel-firmware-ath11k-20230724-150500.3.6.1
kernel-firmware-atheros-20230724-150500.3.6.1
kernel-firmware-bluetooth-20230724-150500.3.6.1
kernel-firmware-bnx2-20230724-150500.3.6.1
kernel-firmware-brcm-20230724-150500.3.6.1
kernel-firmware-chelsio-20230724-150500.3.6.1
kernel-firmware-dpaa2-20230724-150500.3.6.1
kernel-firmware-i915-20230724-150500.3.6.1
kernel-firmware-intel-20230724-150500.3.6.1
kernel-firmware-iwlwifi-20230724-150500.3.6.1
kernel-firmware-liquidio-20230724-150500.3.6.1
kernel-firmware-marvell-20230724-150500.3.6.1
kernel-firmware-media-20230724-150500.3.6.1
kernel-firmware-mediatek-20230724-150500.3.6.1
kernel-firmware-mellanox-20230724-150500.3.6.1
kernel-firmware-mwifiex-20230724-150500.3.6.1
kernel-firmware-network-20230724-150500.3.6.1
kernel-firmware-nfp-20230724-150500.3.6.1
kernel-firmware-nvidia-20230724-150500.3.6.1
kernel-firmware-platform-20230724-150500.3.6.1
kernel-firmware-prestera-20230724-150500.3.6.1
kernel-firmware-qcom-20230724-150500.3.6.1
kernel-firmware-qlogic-20230724-150500.3.6.1
kernel-firmware-radeon-20230724-150500.3.6.1
kernel-firmware-realtek-20230724-150500.3.6.1
kernel-firmware-serial-20230724-150500.3.6.1
kernel-firmware-sound-20230724-150500.3.6.1
kernel-firmware-ti-20230724-150500.3.6.1
kernel-firmware-ueagle-20230724-150500.3.6.1
kernel-firmware-usb-network-20230724-150500.3.6.1
ucode-amd-20230724-150500.3.6.1

Описание

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.


Затронутые продукты
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:kernel-firmware-bnx2-20230724-150500.3.6.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:kernel-firmware-chelsio-20230724-150500.3.6.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:kernel-firmware-i915-20230724-150500.3.6.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:kernel-firmware-intel-20230724-150500.3.6.1

Ссылки
Уязвимость SUSE-SU-2023:3298-1