Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 911940 (CVE-2023-20569)

Summary: AMD INCEPTION kernel vulnerability
Product: Gentoo Security Reporter: Sam James <sam>
Component: KernelAssignee: Gentoo Security <security>
Status: IN_PROGRESS ---    
Severity: normal CC: dist-kernel, gentoo, kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
See Also: https://bugs.gentoo.org/show_bug.cgi?id=911160
Whiteboard:
Package list:
Runtime testing required: ---

Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-08-09 03:19:50 UTC
This is fixed in:
* linux-4.14.321
* linux-4.19.290
* linux-5.4.252
* linux-5.10.189
* linux-5.15.125
* linux-6.1.44
* linux-6.4.9

There does not appear to be fixed microcode available yet. See also the situation in bug 911160.


Note that each of these linux-* releases has a warning from Greg (https://lwn.net/Articles/940798):
>Note, PLEASE TEST this kernel if you are on the [...] tree before using it in
>a real workload. This was a quick release due to the obvious security fixes in
>it, and as such, it has not had very much testing "in the wild". Please let us
>know of any problems seen. Also note that the user/kernel api for the new
>security mitigations might be changing over time, so do not get used to them
>being fixed in stone just yet.

([...] because it's the same for each respective version, the LWN article just says 6.4.x, don't get the wrong impression).