Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-20584

Опубликовано: 13 авг. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10linux-firmwareNot affected
Red Hat Enterprise Linux 6linux-firmwareNot affected
Red Hat Enterprise Linux 7linux-firmwareNot affected
Red Hat Enterprise Linux 8linux-firmwareFixedRHSA-2024:748102.10.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportlinux-firmwareFixedRHSA-2024:741801.10.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicelinux-firmwareFixedRHSA-2024:741801.10.2024
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutionslinux-firmwareFixedRHSA-2024:741801.10.2024
Red Hat Enterprise Linux 9linux-firmwareFixedRHSA-2024:748402.10.2024
Red Hat Enterprise Linux 9.2 Extended Update Supportlinux-firmwareFixedRHSA-2024:748302.10.2024

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2304583kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity

EPSS

Процентиль: 8%
0.00033
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
12 месяцев назад

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.

CVSS3: 5.3
nvd
12 месяцев назад

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.

CVSS3: 5.3
debian
12 месяцев назад

IOMMU improperly handles certain special address ranges with invalid d ...

CVSS3: 5.3
github
12 месяцев назад

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.

CVSS3: 5.3
fstec
12 месяцев назад

Уязвимость микрокода процессоров AMD64 Microcode, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 8%
0.00033
Низкий

5.3 Medium

CVSS3