Описание
Ampere Altra devices before 1.08g and Ampere Altra Max devices before 2.05a allow attackers to control the predictions for return addresses and potentially hijack code flow to execute arbitrary code via a side-channel attack, aka a "Retbleed" issue.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.08g (исключая)
Одновременно
cpe:2.3:o:amperecomputing:ampere_altra_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amperecomputing:ampere_altra:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 2.05a (исключая)
Одновременно
cpe:2.3:o:amperecomputing:ampere_altra_max_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amperecomputing:ampere_altra_max:-:*:*:*:*:*:*:*
EPSS
Процентиль: 38%
0.00165
Низкий
7.8 High
CVSS3
Дефекты
CWE-203
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
Ampere Altra devices before 1.08g and Ampere Altra Max devices before 2.05a allow attackers to control the predictions for return addresses and potentially hijack code flow to execute arbitrary code via a side-channel attack, aka a "Retbleed" issue.
EPSS
Процентиль: 38%
0.00165
Низкий
7.8 High
CVSS3
Дефекты
CWE-203