ELA-910-1 amd64-microcode security update

leak register contents of Zen 2 CPUs

2023-08-01
Packageamd64-microcode
Version3.20230719.1~deb8u1 (jessie), 3.20230719.1~deb9u1 (stretch)
Related CVEs CVE-2019-9836 CVE-2023-20592 CVE-2023-20593


Tavis Ormandy discovered that under specific microarchitectural circumstances, a vector register in “Zen 2” CPUs may not be written to 0 correctly. This flaw allows an attacker to leak register contents across concurrent processes, hyper threads and virtualized guests.

For details please refer to https://lock.cmpxchg8b.com/zenbleed.html https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8

The initial microcode release by AMD only provides updates for second generation EPYC CPUs: Various Ryzen CPUs are also affected, but no updates are available yet. Fixes will be provided in a later update once they are released.

Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler and Michael Schwarz discovered a software-based fault injection attack on SEV VMs, leading to a potential loss of guest virtual machine memory integrity.

For details please refer to https://cachewarpattack.com/ https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3005.html

For more specific details and target dates please refer to the AMD advisory at https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html



For Debian 8 jessie, these problems have been fixed in version 3.20230719.1~deb8u1.

For Debian 9 stretch, these problems have been fixed in version 3.20230719.1~deb9u1.

We recommend that you upgrade your amd64-microcode packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.