Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 25 Jul 2023 11:27:48 +1000
From: Jonathan Gray <jsg@....id.au>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-20593: A use-after-free in AMD Zen2
 Processors

On Mon, Jul 24, 2023 at 01:41:36PM -0400, Marc Deslauriers wrote:
> Hi,
> 
> There seems to be confusion regarding which is the correct commit:
> 
> Your blog post says it's 0bc3126c9cfa0b8c761483215c25382f831a7c6f which is
> for family 17h.
> 
> This post says it's b250b32ab1d044953af2dc5e790819a7703b7ee6 which is for
> family 19h.
> 
> I assume the 17h family one is the correct one?
> 
> Thanks,
> 
> Marc.

Yes, but it by no means covers all zen 2 models.  See amd-ucode/README

  Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107a Length=3200 bytes
  Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008 Length=3200 bytes

17-31-00 Rome/Castle Peak	0x0830107a
17-a0-00 Mendocino		0x08a00008

Models missing include:

17-60-01 Renoir			0x0860010b
17-68-01 Lucienne		0x08608105
17-71-00 Matisse		0x08701032
17-90-02 Van Gogh

The known good patch levels are used by xen and linux.  But the
microcode for Renoir, Lucienne and Matisse is not available as far as
I can tell.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.