Описание
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
A flaw was found in SNP firmware. This vulnerability allows a malicious hypervisor to overwrite a guest's memory or UMC seed, resulting in loss of confidentiality and integrity via improper restriction of write operations.
Отчет
Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.
Меры по смягчению последствий
Available mitigation requires to update BIOS (for updating firmware of CPU). The bug affects hardware (processors of AMD EPYC™ family).
Дополнительная информация
Статус:
EPSS
7.9 High
CVSS3
Связанные уязвимости
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
Уязвимость в прошивке SNP микропрограммного обеспечения графических процессоров AMD, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
EPSS
7.9 High
CVSS3