Hi Nenrique,

On Sat, Mar 08, 2025 at 12:56:25PM -0300, Henrique de Moraes Holschuh wrote:
> retitle 1095470  amd64-microcode: CVE-2024-56161 updated AMD-SEV FW needed to 
> pass attestation
> severity 1095470 important
> clone 1095470 -1
> tag 1095470 + fixed-upstream
> retitle -1  amd64-microcode: CVE-2024-36347 weak microcode update validation
> tag -1 = upstream security wontfix
> severity -1 important
> thanks
> 
> Please let me clarify some details.  If this is incorrect, please provide 
> pointers to the relevant documentation/artifacts:
> 
> There is NO *operating-system-loadable* microcode update available from AMD 
> to address the root issue (weak microcode validation) at this time.   And 
> public documentation states the root-cause fix must be done through a system 
> firmware (UEFI) update.
> 
> https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html
> 
> Maybe this will change, and if it doesn't, maybe lesser mitigations (such as 
> blocking further microcode updates) will become available: I understand 
> running a minimal kernel-monitor secure hypervisor should be able to block 
> the MSR writes that trigger a microcode update, for example.
> 
> So, AMD-SB-7033 / CVE-2024-36347 is unactionable by package amd64-microcode 
> at this time.
> 
> I will clone the bug to split the two CVEs into their own bugs, and tag the 
> one for CVE-2024-36347 "wontfix" accordingly.  I will also downgrade its 
> severity to "important", since unactionable grave bugs can block actionable 
> fixes from propagating to testing, etc.  Should the situation change 
> (hopefully it will), we can revisit this.
> 
> 
> Now, for CVE-2024-56161, which is the AMD-SEV side of the issue.
> 
> There is a pending AMD-SEV loadable firmware update from 2025/02/29, and I 
> will package it soon (but I'd rather hear back from AMD about a few details, 
> first).  However, I understand from AMD SB-3019 that the SEV firmware update 
> will just ensure that SEV remote attestation can succeed on updated firmware. 
>  It is relevant for CVE-2024-56161, yes, but it is NOT FIXING the underlying 
> issue at all.
> 
> https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
> 
> Note that CVE-2024-56161 is mitigated by ensuring no SEV payload attestation 
> can succeed on outdated firmware (and you don't need to do anything for THAT: 
> the SEV payload providers are already on it), and by allowing attestation to 
> succeed on updated firmware.
> 
> What is missing in Debian is a way for SEV payloads to pass attestation *on 
> systems with updated firmware*, and THAT is what the pending  SEV firmware 
> update is about.  I changed the bug title accordingly.
> 
> Since AMD-SEV is *not* officially supported in Debian anyway, I will 
> downgrade the SEV bug to severity to important as well.
> 
> More information about  AMD-SEV:
> https://www.amd.com/en/developer/sev.html

Thanks for your analysis, I have tried to reflect the status in the
security-tracker for both CVEs now.

AFAIU, there are "stop-gap" mitigations in Kernel and Xen as well
which are implemnted (and for the kernel they did already land in
6.12.18 and 6.13.6):

https://www.openwall.com/lists/oss-security/2025/03/06/3

Regards,
Salvatore

Reply via email to