Описание
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
amd64-microcode | fixed | 3.20240710.1 | package | |
amd64-microcode | fixed | 3.20240710.2~deb12u1 | bookworm | package |
amd64-microcode | fixed | 3.20240710.2~deb11u1 | bullseye | package |
Примечания
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html
Связанные уязвимости
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.