Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.DEBIAN.BUGS.RC
  • Bug#1109035: amd64-microcode: 2024-36350/TSA-SQ and CVE-2024-36357/TSA-

    From Salvatore Bonaccorso@21:1/5 to Salvatore Bonaccorso on Sat Jul 19 23:10:01 2025
    Hi Henrique,

    On Thu, Jul 10, 2025 at 09:12:23AM +0200, Salvatore Bonaccorso wrote:
    Source: amd64-microcode
    Version: 3.20250311.1
    Severity: grave
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
    Control: found -1 3.20250311.1~deb12u1

    Hi Henrique,

    The following vulnerabilities were published for amd64-microcode.

    CVE-2024-36350[0]:
    | A transient execution vulnerability in some AMD processors may allow
    | an attacker to infer data from previous stores, potentially
    | resulting in the leakage of privileged information.


    CVE-2024-36357[1]:
    | A transient execution vulnerability in some AMD processors may allow
    | an attacker to infer data in the L1D cache, potentially resulting in
    | the leakage of sensitive information across privileged boundaries.

    My understanding from the patch levels in amd-ucode/README is that we
    are not yet covered by the needed updates on microcode side[2] for CVE-2024-36350/TSA-SQ and CVE-2024-36357/TSA-L1 in amd64-microcode/3.20250311.1. Correct?

    If you fix the vulnerabilities please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2024-36350
    https://www.cve.org/CVERecord?id=CVE-2024-36350
    [1] https://security-tracker.debian.org/tracker/CVE-2024-36357
    https://www.cve.org/CVERecord?id=CVE-2024-36357
    [2] https://www.amd.com/content/dam/amd/en/documents/resources/bulletin/technical-guidance-for-mitigating-transient-scheduler-attacks.pdf

    If not wrong, those updates might be included in https://gitlab.com/kernel-firmware/linux-firmware/-/commit/331eac9144402d6cfa02ff3b2888a40bb9a7a01a

    Is this correct?

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Salvatore Bonaccorso@21:1/5 to Salvatore Bonaccorso on Wed Jul 30 14:00:01 2025
    Hi Henrique,

    On Sat, Jul 19, 2025 at 10:59:33PM +0200, Salvatore Bonaccorso wrote:
    Hi Henrique,

    On Thu, Jul 10, 2025 at 09:12:23AM +0200, Salvatore Bonaccorso wrote:
    Source: amd64-microcode
    Version: 3.20250311.1
    Severity: grave
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
    Control: found -1 3.20250311.1~deb12u1

    Hi Henrique,

    The following vulnerabilities were published for amd64-microcode.

    CVE-2024-36350[0]:
    | A transient execution vulnerability in some AMD processors may allow
    | an attacker to infer data from previous stores, potentially
    | resulting in the leakage of privileged information.


    CVE-2024-36357[1]:
    | A transient execution vulnerability in some AMD processors may allow
    | an attacker to infer data in the L1D cache, potentially resulting in
    | the leakage of sensitive information across privileged boundaries.

    My understanding from the patch levels in amd-ucode/README is that we
    are not yet covered by the needed updates on microcode side[2] for CVE-2024-36350/TSA-SQ and CVE-2024-36357/TSA-L1 in amd64-microcode/3.20250311.1. Correct?

    If you fix the vulnerabilities please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2024-36350
    https://www.cve.org/CVERecord?id=CVE-2024-36350
    [1] https://security-tracker.debian.org/tracker/CVE-2024-36357
    https://www.cve.org/CVERecord?id=CVE-2024-36357
    [2] https://www.amd.com/content/dam/amd/en/documents/resources/bulletin/technical-guidance-for-mitigating-transient-scheduler-attacks.pdf

    If not wrong, those updates might be included in https://gitlab.com/kernel-firmware/linux-firmware/-/commit/331eac9144402d6cfa02ff3b2888a40bb9a7a01a

    Is this correct?

    Will potentially as well need https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=3768c184de68a85b9df6697e7f93a2f61de90a99
    ?

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Henrique de Moraes Holschuh@21:1/5 to All on Thu Jul 31 23:00:01 2025
    Hello Salvatore,

    I will look into it soon, but I am swamped with work so it could take a week or two for me to upload anything .

    As far as I know, we cannot update much of the AMD fleet (computers that did not get firmware updates to switch to the new microcode signature track) anyway, so I will also need to check if this changed somehow, etc.

    --
    Henrique de Moraes Holschuh <hmh@debian.org>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • Recent Visitors

    • Plume
      Sun Sep 14 09:34:52 2025
      from Uk via Raw
    • Gretchiie
      Sun Sep 14 06:07:30 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 17:11:34 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 17:04:03 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 16:32:19 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 15:41:11 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 07:56:03 2025
      from Rognac, France via SSH
    • Gretchiie
      Sat Sep 13 07:22:10 2025
      from Derry, Nh via Telnet
  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (0 / 16)
    Uptime: 169:15:41
    Calls: 10,385
    Calls today: 2
    Files: 14,057
    Messages: 6,416,551

© >>> Magnum BBS <<<, 2025