Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-31356

Опубликовано: 13 авг. 2024
Источник: debian

Описание

Incomplete system memory cleanup in SEV firmware could allow a privileged attacker to corrupt guest private memory, potentially resulting in a loss of data integrity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
amd64-microcodefixed3.20240820.1package
amd64-microcodefixed3.20240820.1~deb12u1bookwormpackage
amd64-microcodefixed3.20240820.1~deb11u1bullseyepackage

Примечания

  • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html

  • https://lore.kernel.org/all/20240820182655.42311-1-john.allen@amd.com/

Связанные уязвимости

CVSS3: 4.4
ubuntu
10 месяцев назад

Incomplete system memory cleanup in SEV firmware could allow a privileged attacker to corrupt guest private memory, potentially resulting in a loss of data integrity.

CVSS3: 4.4
redhat
10 месяцев назад

Incomplete system memory cleanup in SEV firmware could allow a privileged attacker to corrupt guest private memory, potentially resulting in a loss of data integrity.

CVSS3: 4.4
nvd
10 месяцев назад

Incomplete system memory cleanup in SEV firmware could allow a privileged attacker to corrupt guest private memory, potentially resulting in a loss of data integrity.

CVSS3: 4.4
github
10 месяцев назад

Incomplete system memory cleanup in SEV firmware could allow a privileged attacker to corrupt guest private memory, potentially resulting in a loss of data integrity.

oracle-oval
8 месяцев назад

ELSA-2024-12797: linux-firmware security update (MODERATE)