Safety instructions for AMD-SB-7009

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On February 13th, 2024, AMD published the Security Bulletin AMD-SB-7009. It refers to several security vulnerabilities, that concern various AMD platforms.[1]

Affected systems

AMD EPYC systems:

AMD Threadripper Systeme:

  • systems with "Zen2" AMD Ryzen Threadripper 3000 Castle Peak processors
  • systems "Zen3" AMD Ryzen Threadripper PRO 3000WX/5000WX Castle Peak and Chagall processors

Solution for the problem

AMD has already provided AGESA versions for the above mentioned systems to eliminate the security vulnerability. These can be installed via BIOS update.

Supermicro published a Security Bulletin about the security vulnerabilities. A list with BIOS versions of the corresponding mainboards, with an AGESA version to close the gap, is also available:[2]

AMD motherboard generation BIOS version
H11 - Naples 2.8
H11 - Rome 1.4
H12 – Rome/Milan 2.8
H13SSW 1.6
H13DSH 1.6
H13DSG-O-CPU 1.6a
H13SST-G/GC 1.6
H13SSL-N/NC 1.6
H13SSH 1.7
H13DSG-O-CPU-D 1.6
H13SSF 1.6
H13SVW-NT 1.1b
H13DSG-OM 1.0

Updates for products of Thomas-Krenn

BIOS updates with the corresponding AGESA versions are provided in our download area or on the website of the manufacturer.

More information

References

  1. AMD-SB-7009 (www.amd.com/en/resources/product-security, 13.02.2024)
  2. Supermicro AMD Security Bulletin AMD-SB-7009, February 2024 (www.supermicro.com)


Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.

 

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Safety instructions for AMD-SB-3005 CacheWarp
Safety instructions for AMD-SB-4008 AMD Client Processor Vulnerabilities
Security Advisories for AMD-SB-3029